Search Results - (( program case maximization algorithm ) OR ( java application customization algorithm ))

  • Showing 1 - 13 results of 13
Refine Results
  1. 1

    Performances Of Metaheuristic Algorithms In Optimizing Tool Capacity Allocations by Goheannee

    Published 2014
    “…The demand scenarios were with different demand intensities and levels. For each case study, a capacity model was constructed in Microsoft Excel spreadsheet, as an input to the above mentioned metaheuristic algorithms which programmed in Matlab coding. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Optimization of multipurpose reservoir operation using evolutionary algorithms / Mohammed Heydari by Mohammed , Heydari

    Published 2017
    “…The described model was resolved by linear programming and evolutionary algorithms in Microsoft Excel (Solver). …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5

    An integrated reservoir modelling and evolutionary algorithm for optimizing field development in a mature fractured reservoir by Sambo, C.H., Hematpour, H., Danaei, S., Herman, M., Ghosh, D.P., Abass, A., Elraies, K.A.

    Published 2016
    “…The proposed location of wells has improved Net Present Value (NPV) by + 10 higher than the base case without infill wells. Examining two different optimization approaches used in this work, the genetic algorithm program gave results similar to the results that were obtained by an exhaustive method with much less computation time which is a great issue mainly for large size fields or fields which possess condensate gas and require the use of compositional simulators. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Scheduling dynamic cellular manufacturing systems in the presence of cost uncertainty using heuristic method by Delgoshaei, Aidin

    Published 2016
    “…It is observed that in 67% of studied cases, inflation rate can strengthen cell load variation. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Optimal assignments of versions to processors in fault-tolerant computer systems by Leow, Soo Kar, McAllister, David F.

    Published 1988
    “…This paper addresses the problem of assigning n independently developed version of a program to n different computers to maximize system reliability. …”
    Get full text
    Get full text
    Article
  8. 8

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  9. 9

    An evaluation of Monte Carlo-based hyper-heuristic for interaction testing of industrial embedded software applications. by S. Ahmed, Bestoun, Enoiu, Eduard, Afzal, Wasif, Kamal Z., Zamli

    Published 2020
    “…Hyper-heuristic is a new methodology for the adaptive hybridization of meta-heuristic algorithms to derive a general algorithm for solving optimization problems. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11
  12. 12

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    An innovative approach of blending security features in energy-efficient routing for a crowded network of wireless sensors by Pathan, Al-Sakib Khan, Ahmed, Tarem

    Published 2014
    “…Wireless sensor networks (WSN) are emerging as both an important new tier in the IT (information technology) ecosystem and a rich domain of active research involving hardware and system design, networking, distributed algorithms, programming models, data management, security, and social factors [1,2]. …”
    Get full text
    Get full text
    Get full text
    Book Chapter