Search Results - (( integer application need algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- integer application »
- application need »
- java application »
- need algorithm »
-
1
An Integer Linear Programming model and Adaptive Genetic Algorithm approach to minimize energy consumption of Cloud computing data centers
Published 2018“…Hence, solutions are needed to minimize the energy consumption. This paper focuses on the development of a dynamic task scheduling algorithm by proposing an Integer Linear Programming (ILP) model that minimizes the energy consumption in a Cloud data center. …”
Get full text
Get full text
Article -
2
A genetic algorithm for capital budgeting problem with fuzzy parameters
Published 2010Get full text
Get full text
Conference or Workshop Item -
3
-
4
Evolutionary Algorithms In Auction Models Of Service Procurement
Published 2019Get full text
Get full text
Thesis -
5
A mixed integer linear programming model for real-time task scheduling in multiprocessor computer system
Published 2012“…There has been an upsurge in real-time multimedia applications in recent time.On a network, the ability of an average uni processor computer to handle such data may be limited due to the large size of such data.Also, there may be a high number of concurrent users who may want to retrieve data and the need to process them in real-time; and in continuous stream. …”
Get full text
Get full text
Get full text
Article -
6
Comparison Of Two Hybrid Algorithms On Incorporated Aircraft Routing And Crew Pairing Problems
Published 2024Get full text
Get full text
journal::journal article -
7
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006Get full text
Get full text
Final Year Project -
8
-
9
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
10
Randomized pixel selection for enhancing LSB algorithm security against brute-force attack
Published 2017“…However, operating pixels on a sequential basis leaves the algorithm susceptible to many steganalysis techniques. …”
Get full text
Get full text
Article -
11
Programming Approach in Teaching Operations Research Techniques for Computer Science Students
Published 2005Get full text
Get full text
Conference or Workshop Item -
12
-
13
User-Device Authentication Model With Digital Certificate For Smartphone User
Published 2024thesis::master thesis -
14
-
15
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
-
17
-
18
-
19
-
20
