Search Results - (( java implementation _ algorithm ) OR ( virtual using optimization algorithm ))
Search alternatives:
- java implementation »
- virtual using »
-
1
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…LACE algorithm is used to schedule and optimize Virtual Machine (VMs) allocation across the servers according to behaviour obtained from locust nature. …”
Get full text
Get full text
Thesis -
2
-
3
RSA Encryption & Decryption using JAVA
Published 2006“…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
4
Optimal path planning algorithms in virtual environments
Published 2006“…In addition, Extended Prim algorithm was applied to shorten the travelling time and a virtual exhibition area was used as a domain to execute and analyse the algorithms performances. …”
Get full text
Get full text
Thesis -
5
Node placement optimization using extended virtual force and cuckoo search algorithm in wireless sensor network
Published 2014“…This study proposed Extended Virtual Force and Cuckoo Search (EVFCS) algorithm with a combination of EVFA and CS algorithm to find an optimal node placement. …”
Get full text
Get full text
Get full text
Thesis -
6
Optimal tuning of virtual inertia control for frequency regulation of microgrid
Published 2024“…The parameters of both the secondary and virtual control are tuned using a novel hybrid sparrow search algorithm with mountain gazelle optimizer algorithm. …”
Get full text
Get full text
Article -
7
Dynamics resource allocation via virtual machine for cloud computing / Mohd Badrulhisham Ismail
Published 2014“…This new algorithm is called Dynamics Threshold Optimize System. …”
Get full text
Get full text
Article -
8
-
9
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
10
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
11
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
12
Dynamics resource allocation via virtual machine for cloud computing / Mohd Badrulhisham Ismail
Published 2014“…This new algorithm is called Dynamics Threshold Optimize System. …”
Get full text
Get full text
Thesis -
13
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
14
-
15
An efficient virtual tour : a merging of path planning and optimization
Published 2004“…This paper describes the result of a research project aimed to integrate a path-planning optimization-algorithm and produce an efficient tour in a virtual environment. …”
Get full text
Get full text
Article -
16
Optimal virtual microgrid design using community energy storage for distribution networks
Published 2023“…Louvain heuristic algorithm is used for optimizing the VM partitioning. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
18
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
Get full text
Get full text
Get full text
Book -
19
-
20
