Search Results - (( java application matching algorithm ) OR ( waste reduction computer algorithm ))
Search alternatives:
- application matching »
- java application »
- waste reduction »
-
1
-
2
Efficiency of heuristic algorithms in solving waste collection vehicle routing problem: a case study
Published 2018“…This paper investigated the efficiency of six heuristic algorithms from prior studies in the attempt to solve issues related to waste collection, namely: (i) Nearest Greedy (NG), (ii) Further from Depot (FFD), (iii) Different Initial Customer (DIC), (iv) Savings Approach, (v) Sweep Algorithm, and (vi) Different Initial Customer based on Sweep Algorithm. …”
Get full text
Get full text
Get full text
Article -
3
Efficiency of heuristic algorithms in solving waste collection vehicle routing problem: a case study
Published 2018“…This paper investigated the efficiency of six heuristic algorithms from prior studies in the attempt to solve issues related to waste collection, namely: (i) Nearest Greedy (NG), (ii) Further from Depot (FFD), (iii) Different Initial Customer (DIC), (iv) Savings Approach, (v) Sweep Algorithm, and (vi) Different Initial Customer based on Sweep Algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Development of novel algorithm features in the modelling of cyclic processes
Published 2002“…The second feature of the algorithm is a reduction of the number of cycles required to reach the CSS while ensuring that the CSS is certainly determined. …”
Get full text
Get full text
Get full text
Article -
5
Dynamic Task Offloading Algorithm for optimising IoT network quality of service in the Mobile-Fog-Cloud System
Published 2023“…The attribute reduction technique is implemented with Matlab. The EECPD and GAEIWPSO algorithms are implemented with Python and Networkx simulators while DTOA algorithm is implemented with iFogSim to demonstrate the efficiency of the proposed scheme. …”
Get full text
Get full text
Thesis -
6
-
7
-
8
-
9
Message based random variable length key encryption algorithm.
Published 2009Get full text
Get full text
Article -
10
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Snort-based smart and swift intrusion detection system
Published 2018“…Methods/Statistical Analysis: The features are extracted using back-propagation algorithm. Then, only these relevant features are trained with the help of multi-layer perceptron supervised neural network. …”
Get full text
Get full text
Get full text
Article -
12
-
13
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…The main algorithms used are profile determination and user similarity. …”
Get full text
Get full text
Thesis
