Search Results - (( java application a algorithm ) OR ( using task using algorithm ))
Search alternatives:
- java application »
- using algorithm »
- application a »
- a algorithm »
- using task »
- task using »
-
1
Batch mode heuristic approaches for efficient task scheduling in grid computing system
Published 2016“…We simulate our proposed algorithms using a Java based simulator that is purposedly built for Grid computing simulations. …”
Get full text
Get full text
Get full text
Thesis -
2
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Therefore, in this paper, we proposed Dynamic tasks scheduling algorithm based on attribute reduction with an enhanced hybrid Genetic Algorithm and Particle Swarm Optimization for optimal device selection. …”
Get full text
Get full text
Article -
3
Input-output based relation combinatorial testing using whale optimization algorithm for generating near optimum number of test suite
Published 2025“…Software testing is necessary to verify that the employed system is confident enough to be used in a specific task according to the required demand. …”
Get full text
Get full text
Get full text
Article -
4
JTAGGER
Published 2006“…In this project, rule-based tagging algorithm is used as the mechanism to develop the system which named JTagger. …”
Get full text
Get full text
Final Year Project -
5
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…These data are processed and stored in appropriate formats in a MySQL server database. Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
6
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. …”
Get full text
Get full text
Get full text
Article -
8
Tacit knowledge for business intelligence framework using cognitive-based approach
Published 2022“…The framework was tested on 23 librarians from several university libraries in West Java and Yogyakarta, Indonesia. The algorithm starts with a content targeted interview to identify the list of problems faced by librarians. …”
Get full text
Get full text
Thesis -
9
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…KSFaci is embedded in web environment and is implemented using Java Servlet and runs under Apache server. …”
Get full text
Get full text
Thesis -
10
-
11
RSA Encryption & Decryption using JAVA
Published 2006“…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
Get full text
Get full text
Final Year Project -
12
Smart student timetable planner
Published 2025“…Timetable planning is a crucial yet challenging task for university students, as traditional manual methods are often time-consuming, prone to errors, and lack collaborative support. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…But the large number of available prevention techniques make the selection of the best solution a big challenge, because not every technique fit all types of web application, hence a one technique for all is another issue and a difficult task. …”
Get full text
Get full text
Get full text
Article -
14
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
15
Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm
Published 2022“…In this thesis study, hybrid Genetic Algorithm and Bat Algorithm proposed to solve the task scheduling problem. …”
Get full text
Get full text
Get full text
Academic Exercise -
16
Task scheduling in cloud computing environment using hybrid of genetic algorithm and naked mole rat algorithm (GA-NMRA)
Published 2022“…This research proposes task scheduling in cloud computing using a hybrid genetic algorithm and naked mole rat algorithm to solve the task scheduling problem. …”
Get full text
Get full text
Get full text
Academic Exercise -
17
Task scheduling in cloud computing using hybrid genetic algorithm and bald eagle search (GA-BES)
Published 2022“…This Study proposes task scheduling in cloud computing using a hybrid genetic algorithm, and bald eagle search proposed to solve the task scheduling problem. …”
Get full text
Get full text
Get full text
Academic Exercise -
18
Impatient task mapping in elastic cloud using genetic algorithm
Published 2011“…This study takes the problem of immediate task scheduling under an intercloud infrastructure using a genetic algorithm. …”
Get full text
Get full text
Get full text
Article -
19
Task scheduling on computational grids using Gravitational Search Algorithm
Published 2014“…In this paper, Gravitational Search Algorithm (GSA), as one of the latest population-based metaheuristic algorithms, is used for task scheduling on computational Grids. …”
Get full text
Get full text
Article -
20
Task allocation in production systems using firefly algorithm / Nurhani Zawani Zulkifli
Published 2020“…It is hard for the management to optimize the number of workstations without violating the restriction of the line such as precedence relations among the task. Therefore, from the above matter, this study will solve the Simple Assembly Line Balancing Problem Type 1 (SALBP-1) by minimizing the number of workstations to complete all tasks based on the given cycle time and task time using firefly algorithm. …”
Get full text
Get full text
Thesis
