Search Results - (( integer application need algorithm ) OR ( java data normalization algorithm ))
Search alternatives:
- normalization algorithm »
- integer application »
- data normalization »
- application need »
- need algorithm »
- java »
-
1
An Integer Linear Programming model and Adaptive Genetic Algorithm approach to minimize energy consumption of Cloud computing data centers
Published 2018“…Hence, solutions are needed to minimize the energy consumption. This paper focuses on the development of a dynamic task scheduling algorithm by proposing an Integer Linear Programming (ILP) model that minimizes the energy consumption in a Cloud data center. …”
Get full text
Get full text
Article -
2
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
3
A genetic algorithm for capital budgeting problem with fuzzy parameters
Published 2010Get full text
Get full text
Conference or Workshop Item -
4
-
5
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
6
Evolutionary Algorithms In Auction Models Of Service Procurement
Published 2019Get full text
Get full text
Thesis -
7
A mixed integer linear programming model for real-time task scheduling in multiprocessor computer system
Published 2012“…There has been an upsurge in real-time multimedia applications in recent time.On a network, the ability of an average uni processor computer to handle such data may be limited due to the large size of such data.Also, there may be a high number of concurrent users who may want to retrieve data and the need to process them in real-time; and in continuous stream. …”
Get full text
Get full text
Get full text
Article -
8
Comparison Of Two Hybrid Algorithms On Incorporated Aircraft Routing And Crew Pairing Problems
Published 2024Get full text
Get full text
journal::journal article -
9
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006Get full text
Get full text
Final Year Project -
10
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
11
-
12
Randomized pixel selection for enhancing LSB algorithm security against brute-force attack
Published 2017“…However, operating pixels on a sequential basis leaves the algorithm susceptible to many steganalysis techniques. …”
Get full text
Get full text
Article -
13
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
14
Programming Approach in Teaching Operations Research Techniques for Computer Science Students
Published 2005Get full text
Get full text
Conference or Workshop Item -
15
-
16
User-Device Authentication Model With Digital Certificate For Smartphone User
Published 2024thesis::master thesis -
17
-
18
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
-
20
