Search Results - (( policy implementation modified algorithm ) OR ( java application model algorithm ))
Search alternatives:
- implementation modified »
- policy implementation »
- application model »
- java application »
-
1
-
2
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
3
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The plugin can be 'installed' on any other web application with minimum efforts. The algorithm can be implemented as part of Web Server layer, not as part of the business logic layer. …”
Get full text
Get full text
Conference or Workshop Item -
4
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
5
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Smart grid: Bio-inspired algorithms energy distributions for data centers
Published 2025“…This project proposes and evaluates three bio-inspired and evolutionary algorithms for VM allocation and migration: Ant Colony Optimisation (ACO), Particle Swarm Optimisation (PSO), and a Modified Genetic Algorithm (MGA). …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
8
-
9
-
10
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…In this type of environment it is nearly impossible to prove the effectiveness of a scheduling algorithm. Hence the main objective of this study is to develop a desktop grid simulator toolkit for measuring and modeling scheduler algorithm performance. …”
Get full text
Get full text
Final Year Project -
11
Secure Image Steganography Using Encryption Algorithm
Published 2016“…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
Get full text
Get full text
Conference or Workshop Item -
12
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…This thesis describes original research in the field of software quality model by presenting a Feature Ranking Algorithm (FRA) for Pragmatic Quality Factor (PQF) model. …”
Get full text
Get full text
Get full text
Thesis -
13
Runtime pluggable CPU scheduler for linux operating system
Published 2010“…The CPU scheduler uses different scheduling policies (algorithms) to manage such processes. Each scheduling policy has its own properties and suits specific applications or a specific environment. …”
Get full text
Get full text
Thesis -
14
Modified ant colony optimization algorithms for deterministic and stochastic inventory routing problems / Lily Wong
Published 2018“…The computational results show that the algorithms which implement this new formulation are able to produce better solutions. …”
Get full text
Get full text
Get full text
Thesis -
15
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Subjects:Conference paper -
16
Solving a multi-period inventory routing problem with stochastic unstationary demand rates
Published 2022“…The computational results show that the algorithms that implement this modified formulation can achieve a better optimization result. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Solving a multiperiod inv entory routing problem with stochastic unstationary demand rates
Published 2022“…The computational results show that the algorithms that implement this modified formulation can achieve a better optimization result. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Network game (Literati) / Chung Mei Kuen
Published 2003“…Therefore, efficient and robust servers that process separate client connections in separate threads are needed. Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
Get full text
Get full text
Thesis -
19
Ant Colony Optimization for Solving Solid Waste Collection Scheduling Problems
Published 2009“…The results indicated that for all demand ranges, proposed ACO algorithm showed better performance than SA algorithm. …”
Get full text
Get full text
Get full text
Article -
20
Ant colony optimization for solving solid waste collection scheduling problems
Published 2009“…The results indicated that for all demand ranges, proposed ACO algorithm showed better performance than SA algorithm. …”
Get full text
Get full text
Get full text
Article
