Search Results - (( java application modified algorithm ) OR ( dynamic relocation optimization algorithm ))

  • Showing 1 - 12 results of 12
Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Midrange exploration exploitation searching particle swarm optimization with HSV-template matching for crowded environment object tracking by Nurul Izzatie Husna, Muhamad Fauzi

    Published 2023
    “…In this algorithm, the worst particle will be relocating to a new position to ensure the concept of exploration and exploitation remains in the search space. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Optimising cloud computing performance with an enhanced dynamic load balancing algorithm for superior task allocation by Zhanuzak, Raiymbek, Ala'anzy, Mohammed Alaa, Othman, Mohamed, Algarni, Abdulmohsen

    Published 2024
    “…Unlike benchmark algorithms that rely on static VM selection or post-hoc relocation of cloudlets, the EDLB algorithm dynamically identifies optimal cloudlet placement in real-time. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    A wireless interference-aware internet-of-things gateway placement framework with genetic algorithm approach by Kong, Zan Wai

    Published 2022
    “…However, there is no existing gateway placement scheme that considers all the factors of number of gateways, sensor nodes coverage, lateral bound (inter-gateway) connections, redundancy for fault tolerance and dynamic changes of sensor nodes’ location. Therefore, this work proposes a framework to optimized gateway placement that considers all the aforementioned factors. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7
  8. 8

    Automatic generic process migration system in linux by Zarrabi, Amirreza

    Published 2012
    “…A fexible interface to the underlying checkpoint/ restart subsystem is designed which permits users to specify the migration mechanism according to process constraints. A migration algorithm is designed which attempts to exploit the unique features of the basic migration algorithms to form a generic algorithm. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  12. 12