Search Results - (( program case maximization algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- maximization algorithm »
- case maximization »
- java application »
- program case »
-
1
Performances Of Metaheuristic Algorithms In Optimizing Tool Capacity Allocations
Published 2014“…The demand scenarios were with different demand intensities and levels. For each case study, a capacity model was constructed in Microsoft Excel spreadsheet, as an input to the above mentioned metaheuristic algorithms which programmed in Matlab coding. …”
Get full text
Get full text
Thesis -
2
Optimization of multipurpose reservoir operation using evolutionary algorithms / Mohammed Heydari
Published 2017“…The described model was resolved by linear programming and evolutionary algorithms in Microsoft Excel (Solver). …”
Get full text
Get full text
Get full text
Thesis -
3
-
4
Integrated Grasshopper Algorithm-Evolutionary Programming Technique for Distributed Energy Resources Allocation
Published 2023Conference Paper -
5
An integrated reservoir modelling and evolutionary algorithm for optimizing field development in a mature fractured reservoir
Published 2016“…The proposed location of wells has improved Net Present Value (NPV) by + 10 higher than the base case without infill wells. Examining two different optimization approaches used in this work, the genetic algorithm program gave results similar to the results that were obtained by an exhaustive method with much less computation time which is a great issue mainly for large size fields or fields which possess condensate gas and require the use of compositional simulators. …”
Get full text
Get full text
Conference or Workshop Item -
6
Scheduling dynamic cellular manufacturing systems in the presence of cost uncertainty using heuristic method
Published 2016“…It is observed that in 67% of studied cases, inflation rate can strengthen cell load variation. …”
Get full text
Get full text
Thesis -
7
Optimal assignments of versions to processors in fault-tolerant computer systems
Published 1988“…This paper addresses the problem of assigning n independently developed version of a program to n different computers to maximize system reliability. …”
Get full text
Get full text
Article -
8
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
9
An evaluation of Monte Carlo-based hyper-heuristic for interaction testing of industrial embedded software applications.
Published 2020“…Hyper-heuristic is a new methodology for the adaptive hybridization of meta-heuristic algorithms to derive a general algorithm for solving optimization problems. …”
Get full text
Get full text
Get full text
Article -
10
Public healthcare facility planning in Malaysia : Using location allocation models / S. Sarifah Radiah Shariff
Published 2012“…The models are extended to the capacitated case where a bigger district of Kuala Langat, Selangor is considered. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
11
-
12
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
An innovative approach of blending security features in energy-efficient routing for a crowded network of wireless sensors
Published 2014“…Wireless sensor networks (WSN) are emerging as both an important new tier in the IT (information technology) ecosystem and a rich domain of active research involving hardware and system design, networking, distributed algorithms, programming models, data management, security, and social factors [1,2]. …”
Get full text
Get full text
Get full text
Book Chapter
