Job scheduling approaches based on firefly algorithm for computational grid
Computational Grid emerged to satisfy the rising demand for bandwidth, storage, and computational resources. Job Scheduling on computational grids is identified as NP-hard problem due to the heterogeneity of grid resources. Numerous researches have applied metaheuristics to find polynomial times for...
| Main Author: | Aboalgassim Alfaki, Adil Yousif |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2013
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/38953/5/AdilYousifAboalgassimPFSKSM2013.pdf |
Similar Items
An alternative ranking scheme for computational grid resource selection
by: Seraydashti, Mehran Ranjbar
Published: (2013)
by: Seraydashti, Mehran Ranjbar
Published: (2013)
A framework for the implementation of computer based testing for Saudi Arabia secondary schools
by: Hakami, Yahya Abduh A.
Published: (2014)
by: Hakami, Yahya Abduh A.
Published: (2014)
To assess impact of organizational factors on cloud computing adoption in SMEs
by: Abdollahzadehgan, Azam
Published: (2013)
by: Abdollahzadehgan, Azam
Published: (2013)
Cloud computing adoption in banking system (UTM) in terms of customers perspectives
by: Asadi, Shahla
Published: (2013)
by: Asadi, Shahla
Published: (2013)
Clustering approach based on feature weighting for recommendation system in movie domain
by: Nabizadeh Rafsanjani, Amir Hossein
Published: (2013)
by: Nabizadeh Rafsanjani, Amir Hossein
Published: (2013)
Hardware and software co-simulation platform for convolution or correlation based image processing algorithms
by: Ayat, Sayed Omid
Published: (2014)
by: Ayat, Sayed Omid
Published: (2014)
Acceptance model of SaaS cloud computing at northern Malaysian main campus public universities
by: Al-Madhagy, Taufiq Hail Ghilan
Published: (2018)
by: Al-Madhagy, Taufiq Hail Ghilan
Published: (2018)
A graphics processing unit based network intrusion detection system with bloom filter pattern matching algorithm
by: Ong, Wen Jian
Published: (2015)
by: Ong, Wen Jian
Published: (2015)
Algorithm to prevent and detect insider multi transaction malicious activity in database
by: Dashti Khavidaki, Seyyed Mojtaba
Published: (2013)
by: Dashti Khavidaki, Seyyed Mojtaba
Published: (2013)
Multifaceted requirement traceability approach to support software evolution
by: Siti Rochimah, Siti Rochimah
Published: (2010)
by: Siti Rochimah, Siti Rochimah
Published: (2010)
A new feature extraction algorithm for overlapping leaves of rubber tree
by: Anjomshoae, Sule
Published: (2014)
by: Anjomshoae, Sule
Published: (2014)
Optimal tuning of controller parameters for a magnetic levitation system using radial basis based neural network metamodeling approach
by: Mohammad Abdalhadi, Abdualrhman Daw
Published: (2021)
by: Mohammad Abdalhadi, Abdualrhman Daw
Published: (2021)
Decision framework on selecting the optimal subjective weighting method for evaluating e-learning approaches
by: Mohammed, Husam Jasim
Published: (2018)
by: Mohammed, Husam Jasim
Published: (2018)
Voltage SAG mitigation by optimizing the location of distributed generation using genetic algorithm for three distributed generation types
by: Abdrabou Ahmed, Ahmed Mohamed
Published: (2014)
by: Abdrabou Ahmed, Ahmed Mohamed
Published: (2014)
Ensemble approach on enhanced compressed noise EEG data signal in wireless body area sensor network
by: A. Abualsaud, Khalid Ahmed
Published: (2015)
by: A. Abualsaud, Khalid Ahmed
Published: (2015)
Component-based tools for educational simulations
by: Ruzelan, Khalid
Published: (2013)
by: Ruzelan, Khalid
Published: (2013)
Vision-based customer counting for shopping lots
by: Lee, Fang Soong
Published: (2014)
by: Lee, Fang Soong
Published: (2014)
Brain wavesclassification towardhuman emotion based on EEG signal
by: Ahmed, Mohammed Abdulkareem
Published: (2013)
by: Ahmed, Mohammed Abdulkareem
Published: (2013)
A model-based testing framework for trusted platform module
by: Farag Elhagari, Usama Tharwat
Published: (2015)
by: Farag Elhagari, Usama Tharwat
Published: (2015)
Route discovery based on energy-distance aware routing scheme for MANET
by: Jailani, Abdul Kadir
Published: (2016)
by: Jailani, Abdul Kadir
Published: (2016)
An energy efficient acknowledgement-based method for selfish node detection and avoidance in open MANET
by: Nikmaram, Mehrnaz
Published: (2014)
by: Nikmaram, Mehrnaz
Published: (2014)
DNA-based client puzzle for WLAN association protocol against connection request flooding
by: Ordi, Ali
Published: (2016)
by: Ordi, Ali
Published: (2016)
Discriminant analysis of multi sensor data fusion based on percentile forward feature selection
by: Maz Jamilah, Masnan
Published: (2017)
by: Maz Jamilah, Masnan
Published: (2017)
Secure on-demand routing protocol in wireless sensor networks based on route weight and knowledge sharing
by: Farrokhtala, Ali
Published: (2013)
by: Farrokhtala, Ali
Published: (2013)
Ellipse gamma spectrum iris recognition based on average square shrinking segmentation and trapezium normalisation
by: Shamsi, Mahboubeh
Published: (2011)
by: Shamsi, Mahboubeh
Published: (2011)
Energy efficient chain based routing protocol for deterministic node deployment in wireless sensor networks
by: Marhoon, Haydar Abdulameer
Published: (2017)
by: Marhoon, Haydar Abdulameer
Published: (2017)
A qualitative study on best practices and process of eliciting unambiguous quality attributes in scrum-based projects
by: Mahmoud, Hussin Ahmed Abdelkader
Published: (2022)
by: Mahmoud, Hussin Ahmed Abdelkader
Published: (2022)
Predictive Divert Failure Route Protocol for Mobile Ad-Hoc Networks Based on Ad-Hoc on Demand Distance Vector
by: Abdule, Sayid Mohamed
Published: (2012)
by: Abdule, Sayid Mohamed
Published: (2012)
Score Fusion Using Hybrid Bacterial Foraging Optimization And Particle Swarm Optimization (Bfo-Pso) For Hand-Based Multimodal Biometrics
by: Shanmugasundaram, Karthikeyan
Published: (2020)
by: Shanmugasundaram, Karthikeyan
Published: (2020)
TCP Sintok: Transmission control protocol with delay-based loss detection and contention avoidance mechanisms for mobile ad hoc networks
by: Habbal, Adib
Published: (2014)
by: Habbal, Adib
Published: (2014)
Pembangunan aplikasi permainan strategi untuk latihan penyelesaian masalah (snake defense)
by: Salim, Muhammad Fadzley
Published: (2013)
by: Salim, Muhammad Fadzley
Published: (2013)
Fasa kesediaan digital forensik bagi Kerajaan Negeri Johor
by: Jaffar, Ruzana
Published: (2013)
by: Jaffar, Ruzana
Published: (2013)
Evaluation of machine learning techniques for imbalanced data in IDS
by: Mokaramian, Shahram
Published: (2013)
by: Mokaramian, Shahram
Published: (2013)
Pembangunan aplikasi cepat membaca al-Quran untuk platform android (Mai IQra)
by: Jusoh, Yanti Munirah
Published: (2013)
by: Jusoh, Yanti Munirah
Published: (2013)
Design an interactive learning model: using persuasive technology to learn children Arabic alphabets
by: Abusafia, Alaa H.
Published: (2013)
by: Abusafia, Alaa H.
Published: (2013)
Efficiency key generation management in a big organization for symmetric cryptography system
by: Mirzaee, Atefeh
Published: (2013)
by: Mirzaee, Atefeh
Published: (2013)
Benchmarking & penetration testing of Windows XP, Windows 7, Windows 8
by: Tahir, Farhaj
Published: (2013)
by: Tahir, Farhaj
Published: (2013)
Pembangunan aplikasi buku cerita interaktif Malaysian Folktale bagi pasaran IOS
by: Aripin, Nurhidayah
Published: (2013)
by: Aripin, Nurhidayah
Published: (2013)
Digital image stabilization for vibration reduction of videos captured from Unmanned Aerial Vehicle (UAV)
by: Chang, Sy Luen
Published: (2013)
by: Chang, Sy Luen
Published: (2013)
Pembangunan aplikasi panduan solat untuk platform android (Muslim Solah)
by: Azmi, Shahdatunnaim
Published: (2013)
by: Azmi, Shahdatunnaim
Published: (2013)
Similar Items
-
An alternative ranking scheme for computational grid resource selection
by: Seraydashti, Mehran Ranjbar
Published: (2013) -
A framework for the implementation of computer based testing for Saudi Arabia secondary schools
by: Hakami, Yahya Abduh A.
Published: (2014) -
To assess impact of organizational factors on cloud computing adoption in SMEs
by: Abdollahzadehgan, Azam
Published: (2013) -
Cloud computing adoption in banking system (UTM) in terms of customers perspectives
by: Asadi, Shahla
Published: (2013) -
Clustering approach based on feature weighting for recommendation system in movie domain
by: Nabizadeh Rafsanjani, Amir Hossein
Published: (2013)