Job scheduling approaches based on firefly algorithm for computational grid
Computational Grid emerged to satisfy the rising demand for bandwidth, storage, and computational resources. Job Scheduling on computational grids is identified as NP-hard problem due to the heterogeneity of grid resources. Numerous researches have applied metaheuristics to find polynomial times for...
| Auteur principal: | Aboalgassim Alfaki, Adil Yousif |
|---|---|
| Format: | Thèse |
| Langue: | anglais |
| Publié: |
2013
|
| Sujets: | |
| Accès en ligne: | http://eprints.utm.my/38953/5/AdilYousifAboalgassimPFSKSM2013.pdf |
Documents similaires
An alternative ranking scheme for computational grid resource selection
par: Seraydashti, Mehran Ranjbar
Publié: (2013)
par: Seraydashti, Mehran Ranjbar
Publié: (2013)
A framework for the implementation of computer based testing for Saudi Arabia secondary schools
par: Hakami, Yahya Abduh A.
Publié: (2014)
par: Hakami, Yahya Abduh A.
Publié: (2014)
To assess impact of organizational factors on cloud computing adoption in SMEs
par: Abdollahzadehgan, Azam
Publié: (2013)
par: Abdollahzadehgan, Azam
Publié: (2013)
Cloud computing adoption in banking system (UTM) in terms of customers perspectives
par: Asadi, Shahla
Publié: (2013)
par: Asadi, Shahla
Publié: (2013)
Clustering approach based on feature weighting for recommendation system in movie domain
par: Nabizadeh Rafsanjani, Amir Hossein
Publié: (2013)
par: Nabizadeh Rafsanjani, Amir Hossein
Publié: (2013)
Hardware and software co-simulation platform for convolution or correlation based image processing algorithms
par: Ayat, Sayed Omid
Publié: (2014)
par: Ayat, Sayed Omid
Publié: (2014)
Acceptance model of SaaS cloud computing at northern Malaysian main campus public universities
par: Al-Madhagy, Taufiq Hail Ghilan
Publié: (2018)
par: Al-Madhagy, Taufiq Hail Ghilan
Publié: (2018)
A graphics processing unit based network intrusion detection system with bloom filter pattern matching algorithm
par: Ong, Wen Jian
Publié: (2015)
par: Ong, Wen Jian
Publié: (2015)
Algorithm to prevent and detect insider multi transaction malicious activity in database
par: Dashti Khavidaki, Seyyed Mojtaba
Publié: (2013)
par: Dashti Khavidaki, Seyyed Mojtaba
Publié: (2013)
Multifaceted requirement traceability approach to support software evolution
par: Siti Rochimah, Siti Rochimah
Publié: (2010)
par: Siti Rochimah, Siti Rochimah
Publié: (2010)
A new feature extraction algorithm for overlapping leaves of rubber tree
par: Anjomshoae, Sule
Publié: (2014)
par: Anjomshoae, Sule
Publié: (2014)
Optimal tuning of controller parameters for a magnetic levitation system using radial basis based neural network metamodeling approach
par: Mohammad Abdalhadi, Abdualrhman Daw
Publié: (2021)
par: Mohammad Abdalhadi, Abdualrhman Daw
Publié: (2021)
Decision framework on selecting the optimal subjective weighting method for evaluating e-learning approaches
par: Mohammed, Husam Jasim
Publié: (2018)
par: Mohammed, Husam Jasim
Publié: (2018)
Voltage SAG mitigation by optimizing the location of distributed generation using genetic algorithm for three distributed generation types
par: Abdrabou Ahmed, Ahmed Mohamed
Publié: (2014)
par: Abdrabou Ahmed, Ahmed Mohamed
Publié: (2014)
Ensemble approach on enhanced compressed noise EEG data signal in wireless body area sensor network
par: A. Abualsaud, Khalid Ahmed
Publié: (2015)
par: A. Abualsaud, Khalid Ahmed
Publié: (2015)
Component-based tools for educational simulations
par: Ruzelan, Khalid
Publié: (2013)
par: Ruzelan, Khalid
Publié: (2013)
Vision-based customer counting for shopping lots
par: Lee, Fang Soong
Publié: (2014)
par: Lee, Fang Soong
Publié: (2014)
Brain wavesclassification towardhuman emotion based on EEG signal
par: Ahmed, Mohammed Abdulkareem
Publié: (2013)
par: Ahmed, Mohammed Abdulkareem
Publié: (2013)
A model-based testing framework for trusted platform module
par: Farag Elhagari, Usama Tharwat
Publié: (2015)
par: Farag Elhagari, Usama Tharwat
Publié: (2015)
Route discovery based on energy-distance aware routing scheme for MANET
par: Jailani, Abdul Kadir
Publié: (2016)
par: Jailani, Abdul Kadir
Publié: (2016)
An energy efficient acknowledgement-based method for selfish node detection and avoidance in open MANET
par: Nikmaram, Mehrnaz
Publié: (2014)
par: Nikmaram, Mehrnaz
Publié: (2014)
DNA-based client puzzle for WLAN association protocol against connection request flooding
par: Ordi, Ali
Publié: (2016)
par: Ordi, Ali
Publié: (2016)
Discriminant analysis of multi sensor data fusion based on percentile forward feature selection
par: Maz Jamilah, Masnan
Publié: (2017)
par: Maz Jamilah, Masnan
Publié: (2017)
Secure on-demand routing protocol in wireless sensor networks based on route weight and knowledge sharing
par: Farrokhtala, Ali
Publié: (2013)
par: Farrokhtala, Ali
Publié: (2013)
Ellipse gamma spectrum iris recognition based on average square shrinking segmentation and trapezium normalisation
par: Shamsi, Mahboubeh
Publié: (2011)
par: Shamsi, Mahboubeh
Publié: (2011)
Energy efficient chain based routing protocol for deterministic node deployment in wireless sensor networks
par: Marhoon, Haydar Abdulameer
Publié: (2017)
par: Marhoon, Haydar Abdulameer
Publié: (2017)
A qualitative study on best practices and process of eliciting unambiguous quality attributes in scrum-based projects
par: Mahmoud, Hussin Ahmed Abdelkader
Publié: (2022)
par: Mahmoud, Hussin Ahmed Abdelkader
Publié: (2022)
Predictive Divert Failure Route Protocol for Mobile Ad-Hoc Networks Based on Ad-Hoc on Demand Distance Vector
par: Abdule, Sayid Mohamed
Publié: (2012)
par: Abdule, Sayid Mohamed
Publié: (2012)
Score Fusion Using Hybrid Bacterial Foraging Optimization And Particle Swarm Optimization (Bfo-Pso) For Hand-Based Multimodal Biometrics
par: Shanmugasundaram, Karthikeyan
Publié: (2020)
par: Shanmugasundaram, Karthikeyan
Publié: (2020)
TCP Sintok: Transmission control protocol with delay-based loss detection and contention avoidance mechanisms for mobile ad hoc networks
par: Habbal, Adib
Publié: (2014)
par: Habbal, Adib
Publié: (2014)
Pembangunan aplikasi permainan strategi untuk latihan penyelesaian masalah (snake defense)
par: Salim, Muhammad Fadzley
Publié: (2013)
par: Salim, Muhammad Fadzley
Publié: (2013)
Fasa kesediaan digital forensik bagi Kerajaan Negeri Johor
par: Jaffar, Ruzana
Publié: (2013)
par: Jaffar, Ruzana
Publié: (2013)
Evaluation of machine learning techniques for imbalanced data in IDS
par: Mokaramian, Shahram
Publié: (2013)
par: Mokaramian, Shahram
Publié: (2013)
Pembangunan aplikasi cepat membaca al-Quran untuk platform android (Mai IQra)
par: Jusoh, Yanti Munirah
Publié: (2013)
par: Jusoh, Yanti Munirah
Publié: (2013)
Design an interactive learning model: using persuasive technology to learn children Arabic alphabets
par: Abusafia, Alaa H.
Publié: (2013)
par: Abusafia, Alaa H.
Publié: (2013)
Efficiency key generation management in a big organization for symmetric cryptography system
par: Mirzaee, Atefeh
Publié: (2013)
par: Mirzaee, Atefeh
Publié: (2013)
Benchmarking & penetration testing of Windows XP, Windows 7, Windows 8
par: Tahir, Farhaj
Publié: (2013)
par: Tahir, Farhaj
Publié: (2013)
Pembangunan aplikasi buku cerita interaktif Malaysian Folktale bagi pasaran IOS
par: Aripin, Nurhidayah
Publié: (2013)
par: Aripin, Nurhidayah
Publié: (2013)
Digital image stabilization for vibration reduction of videos captured from Unmanned Aerial Vehicle (UAV)
par: Chang, Sy Luen
Publié: (2013)
par: Chang, Sy Luen
Publié: (2013)
Pembangunan aplikasi panduan solat untuk platform android (Muslim Solah)
par: Azmi, Shahdatunnaim
Publié: (2013)
par: Azmi, Shahdatunnaim
Publié: (2013)
Documents similaires
-
An alternative ranking scheme for computational grid resource selection
par: Seraydashti, Mehran Ranjbar
Publié: (2013) -
A framework for the implementation of computer based testing for Saudi Arabia secondary schools
par: Hakami, Yahya Abduh A.
Publié: (2014) -
To assess impact of organizational factors on cloud computing adoption in SMEs
par: Abdollahzadehgan, Azam
Publié: (2013) -
Cloud computing adoption in banking system (UTM) in terms of customers perspectives
par: Asadi, Shahla
Publié: (2013) -
Clustering approach based on feature weighting for recommendation system in movie domain
par: Nabizadeh Rafsanjani, Amir Hossein
Publié: (2013)