Search Results - (( developing workload optimization algorithm ) OR ( java implementation model algorithm ))
Search alternatives:
- workload optimization »
- implementation model »
- developing workload »
- java implementation »
- model algorithm »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
2
DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS
Published 2012“…The issue is not only to develop new algorithms, but also to evaluate them on an experimental computational grid, using synthetic and real workload traces, along with the other existing job scheduling algorithms. …”
Get full text
Get full text
Thesis -
3
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
4
Workload utilization dissemination on grid resources for simulation environment
Published 2013“…A combination of these factors will help in developing an optimized scheduling or load balancing algorithm.…”
Get full text
Get full text
Conference or Workshop Item -
5
Optimization of Workload Allocation Problem in a Network of Heterogeneous Computer Systems
Published 2005“…The problem of determining optimal allocation of workload with single and multi class jobs to a parallel of computers is presented followed by a problem of determining optimal buffer size related to arrival of workload to a single computer. …”
Get full text
Get full text
Get full text
Thesis -
6
A comparative evaluation of heuristic and metaheuristic job scheduling algorithms for optimized resource management in cloud environments
Published 2026“…The selection of an appropriate scheduling algorithm is crucial for ensuring optimal performance, scalability, and resource efficiency as cloud environments become increasingly complex and dynamic. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
8
Development of cell formation algorithm and model for cellular manufacturing system
Published 2011“…In addition, one of the main challenges has been development of efficient algorithm for solving aforementioned model to find exact feasible optimal solution. …”
Get full text
Get full text
Thesis -
9
Examination invigilation timetable using Genetic Algorithm / Mohamad Fakhrullah Ibrahim
Published 2025“…To overcome these issues, a system utilizing a Genetic Algorithm (GA) was developed to automate and optimize the timetabling process. …”
Get full text
Get full text
Thesis -
10
Heuristic task scheduling algorithms for optimal resource utilisation in grid computing
Published 2020“…The current challenge facing researchers is to determine the optimal task scheduling method that provides optimal resource utilisation in this extremely heterogeneous environment. …”
Get full text
Get full text
Get full text
Article -
11
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013“…The performance of Java programming model and native programming model are compared with respect to the execution time for blood vessel detection. …”
Get full text
Get full text
Conference or Workshop Item -
12
Optimization of assembly line balancing with energy efficiency by using tiki-taka algorithm
Published 2023“…Then, the TTA is developed before undergoing functionality tests by benchmarking with Particle Swarm Optimization (PSO), Grey Wolf Optimization (GWO), Genetic Algorithm (GA), and Whale Optimization Algorithm (WOA). …”
Get full text
Get full text
Thesis -
13
Performance comparison of least slack time based heuristics for job scheduling on computational grid
Published 2014“…The research reported here therefore is focused on the development of hybrids scheduling algorithms based on deadline and slack time parameters and its variations, using the concept of optimization techniques. …”
Get full text
Get full text
Conference or Workshop Item -
14
D&A: resource optimization in personalized PageRank computations using multi-core machines
Published 2024“…It serves to minimise costs, prompting the development of numerous algorithms tailored to this end. …”
Get full text
Get full text
Get full text
Article -
15
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
Get full text
Get full text
Final Year Project -
16
An approach to modelling and simulating multithreaded schedulers for divide and conquer problems on multicore architecture / Alaa Mohammed Ali Wadi Al-Obaidi
Published 2016“…This problem is represented by the optimal use of the new technology and how this is reflected in software development. …”
Get full text
Get full text
Thesis -
17
Cloud Resource Management Framework Using Monarch Butterfly Harmony Search And Case Based Reasoning
Published 2017“…The rop framework consists of two main components: global resource optimizer (gro) and resource identifier (ri). This research enhances the butterfly optimization algorithm and plugs the resulting algorithm into the rop as a gro. …”
Get full text
Get full text
Thesis -
18
-
19
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The methodology used in this study begun with problem identification, requirement identification, analysed the model process and design the simulation model. The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
20
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item
