Search Results - (( java implementation _ algorithm ) OR ( based computing max algorithm ))
Search alternatives:
- java implementation »
- based computing »
- computing max »
- max algorithm »
-
1
Batch mode heuristic approaches for efficient task scheduling in grid computing system
Published 2016“…We simulate our proposed algorithms using a Java based simulator that is purposedly built for Grid computing simulations. …”
Get full text
Get full text
Get full text
Thesis -
2
SG-PBFS : Shortest Gap-Priority Based Fair Scheduling technique for job scheduling in cloud environment
Published 2024“…Firstly, a Priority-Based Fair Scheduling (PBFS) algorithm has been introduced to schedule jobs so that jobs can access the required resources at optimal times. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
-
4
Max-average: an extended max-min scheduling algorithm for Grid computing environtment
Published 2016“…This paper presents a new proposed grid based scheduling algorithm called Max-Average, inspired from Max-Min algorithm. …”
Get full text
Get full text
Get full text
Article -
5
Cost effective Expa-Max-Min scientific workflow allocation and load balancing strategy in cloud computing
Published 2018“…The experimented results demonstrats that our proposed algorithm, Expa-Max-Min algorithm, is able to produce good quality solutions in terms of minimising average cost and makespan and able to balance loads than Max-Min and Min-Min algorithms.…”
Get full text
Get full text
Get full text
Article -
6
A multidimensional data descriptor tool based on fuzzy min max neural network algorithm
Published 2018Get full text
Get full text
Get full text
Undergraduates Project Papers -
7
Priority hybrid and EEF uplink scheduling algorithm for IEEE 802.16E
Published 2013“…The acquired results have proven that the proposed algorithms have successfully enhanced the legacy hybrid and the deadline based algorithm.…”
Get full text
Get full text
Thesis -
8
-
9
-
10
The application of neural networks and min-max algorithm in digital congkak
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
11
-
12
RSA Encryption & Decryption using JAVA
Published 2006“…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
13
Kernel and multi-class classifiers for multi-floor wlan localisation
Published 2016“…For fingerprint database optimisation, novel access point (AP) selection algorithms which are based on variant AP selection are investigated to improve computational accuracy compared to existing AP selection algorithms such as Max-Mean and InfoGain. …”
Get full text
Get full text
Thesis -
14
-
15
-
16
A comparative evaluation of heuristic and metaheuristic job scheduling algorithms for optimized resource management in cloud environments
Published 2026“…This study provides a comprehensive analysis and comparison of six prevalent scheduling algorithms, namely FCFS, SJF, LJF, EDF, Max-Min, and PSO, under varying cloudlet loads of 200,400,600,800, and 1000. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
18
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
19
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
20
