Search Results - (( evolution optimization customization algorithm ) OR ( java application among algorithm ))
Search alternatives:
- optimization customization »
- customization algorithm »
- evolution optimization »
- application among »
- java application »
- among algorithm »
-
1
An implementation of differential evolution algorithm for a single product and single period multi-echelon supply chain network model
Published 2018“…In this paper, five variants of Differential Evolution (DE) algorithms are proposed to solve the multi-echelon supply chain network optimization problem. …”
Get full text
Get full text
Get full text
Article -
2
-
3
Development of heuristic methods based on genetic algorithm (GA) for solving vehicle routing problem
Published 2008“…The Vehicle Routing Problem (VRP) is an important area and has been studied as combinatorial optimization problems. VRP calls for the determination of the optimal set of routes to be performed by a fleet of vehicle to serve a given set of customers. …”
Get full text
Get full text
Monograph -
4
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
5
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…The prototypes will be developed using JAVA language united with a MySQL database. Core functionality of the simulator are job generation, volunteer generation, simulating algorithms, generating graphical charts and generating reports. …”
Get full text
Get full text
Final Year Project -
6
Crossover and mutation operators of real coded genetic algorithms for global optimization problems
Published 2016“…Because the representations of the solutions are similar to the natural formulation, RCGA gets better-customized to the optimization of problems in a continuous domain. …”
Get full text
Get full text
Thesis -
7
Group formation using genetic algorithm
Published 2009Get full text
Get full text
Get full text
Get full text
Monograph -
8
Network game (Literati) / Chung Mei Kuen
Published 2003“…The possible applications of multimedia-networked system are endless, as the demand to support interactive communication among groups of users has increased significantly. …”
Get full text
Get full text
Thesis -
9
-
10
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…The simulation is implemented with iFogSim and java programming language. The proposed method can be applied in smart cities, monitoring, health delivery, augmented reality, and gaming among others.…”
Get full text
Get full text
Article -
11
-
12
-
13
Batch mode heuristic approaches for efficient task scheduling in grid computing system
Published 2016“…In ELB algorithm, the tasks are distributed among resources based on their execution time range. …”
Get full text
Get full text
Get full text
Thesis -
14
Network monopoly / Tan Kean Yeap
Published 2002“…The possible applications of multimedia-networked system are endless, as the demand to supoort interactive communication among groups of users has increased significantly. …”
Get full text
Get full text
Thesis -
15
-
16
Evaluation of cloud 3D printing services oriented toward the product life cycle based on a triangular fuzzy number complementary judgment matrix
Published 2024“…Notably, the fuzzy analytic hierarchy process (FAHP) algorithm, a core component of our approach, has demonstrated exceptional problem-solving capabilities and unparalleled optimization of performance. …”
Get full text
Get full text
Get full text
Article -
17
Smart student timetable planner
Published 2025“…The system is implemented using Node.js with Express for server-side development, HTML, CSS, and JavaScript for the frontend, and Socket.IO for real-time collaboration. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
-
19
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…Cross-Site Scripting (XSS) vulnerabilities are among the most common and most serious security vulnerabilities in Web applications. …”
Get full text
Get full text
Thesis -
20
