Search Results - (( solution implementation new algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- solution implementation »
- customization algorithm »
- implementation new »
- java application »
- new algorithm »
-
1
Fast Finite Difference Time Domain Algorithms for Solving Antenna Application Problem
Published 2008“…This thesis describes the implementations of new parallel and sequential algorithms for electromagnetic wave propagation from a monopole antenna. …”
Get full text
Get full text
Thesis -
2
Enhancing Market-Based Scheduling Algorithm on Globally Distributed Web Servers Using Least Suitable Sealed Bid Technique
Published 2006“…Scheduling of a multiple distributed servers is considered as a complex problem.considered as NP-complete problem,where no single efficient algorithm guaranteed to produce optimal results.This thesis investigates on how to find optimal solution for distribute system,by implementing market based scheduling Algorithm(MBSA).On implementing the MBSA, a new auction technique which is the least suitable sealed bid auction will be introduced.it is found that least suitable sealed bid technique will give the close-to-optimum solution.In the implementation, cooperative agents were used as a middleware between web servers and stand-alone schedulers. …”
Get full text
Get full text
Thesis -
3
Harmony search algorithm for curriculum-based course timetabling problem
Published 2013“…In this paper, harmony search algorithm is applied to curriculum-based course timetabling.The implementation, specifically the process of improvisation consists of memory consideration, random consideration and pitch adjustment.In memory consideration, the value of the course number for new solution was selected from all other course number located in the same column of the Harmony Memory.This research used the highest occurrence of the course number to be scheduled in a new harmony.The remaining courses that have not been scheduled by memory consideration will go through random consideration, i.e. will select any feasible location available to be scheduled in the new harmony solution. …”
Get full text
Get full text
Get full text
Article -
4
Harmony search algorithm for curriculum-based course timetabling problem
Published 2013“…However, the algorithm produced results that were not comparatively better than those previously known as best solution.With proper modification in terms of the approach in this algorithm would make the algorithm perform better on curriculum-based course timetabling.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks / Salmah Fattah
Published 2022“…Next, it establishes the research problems by implementing various existing algorithms using comparative analysis. …”
Get full text
Get full text
Get full text
Thesis -
6
A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks
Published 2022“…Next, it establishes the research problems by implementing various existing algorithms using comparative analysis. …”
Get full text
Get full text
Get full text
Thesis -
7
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
Published 2004“…Performance has always been the most critical characteristic of a cryptographic algorithm, which determines its effectiveness. In this research the most popular and used algorithm, which is RSA, is implemented with a new modification in order to reduce the calculation time of the algorithm. …”
Get full text
Get full text
Thesis -
8
Enhancement of Ant System Algorithm for Course Timetabling Problem
Published 2009“…For this kind of problem, researchers believe that it will be better to find an approximate solution that can be delivered by a stochastic algorithm than waiting for an exact solution from the deterministic algorithm. …”
Get full text
Get full text
Get full text
Thesis -
9
A new multiobjective tiki-taka algorithm for optimization of assembly line balancing
Published 2023“…Originality/value: MOTTA exploits the information from all players to move to a new position. The algorithm makes all solution candidates have contributions to the algorithm convergence.…”
Get full text
Get full text
Get full text
Get full text
Article -
10
A new variant of black hole algorithm based on multi population and levy flight for clustering problem
Published 2020“…Meta-heuristic algorithm has been successfully implemented on data clustering problems seeking a near optimal solution in terms of quality of the resultant clusters. …”
Get full text
Get full text
Thesis -
11
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…Vendor security products have major implementation constraints such as they need secured organizational environment and breach to SOA specifications, hence introducing new vulnerabilities. …”
Get full text
Get full text
Article -
12
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…Vendor security products have major implementation constraints such as they need secured organizational environment and breach to SOA specifications, hence introducing new vulnerabilities. …”
Get full text
Get full text
Article -
13
New Cryptographic Algorithms for Enhancing Security of Voice Data
Published 2010“…The decryption process on the other hand is divided into two main stages: key extraction process, and decryption process. The proposed solution was implemented and tested and the results showed that the required time for the security processes is minimized compared to some known algorithms such as AES_Rijndael algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Adaptive intelligence job online scheduling within dynamic grid environment based on gridsim
Published 2008“…This paper concentrates on the design and implement of the grid system for study of adaptive job scheduling algorithm based on GridSim. …”
Get full text
Get full text
Article -
15
Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment
Published 2011“…Besides, this algorithm provides home users or application developers to implement their own event operators with bespoke syntax for their application purpose by defining cross-events corresponding to the event operators. …”
Get full text
Get full text
Thesis -
16
Process Planning Optimization In Reconfigurable Manufacturing Systems
Published 2008“…On the other hand, the superior performance of the genetic algorithm that implements an extended diversity control mechanism demonstrates that more competent genetic algorithms can be designed through customized operators. …”
Get full text
Get full text
Thesis -
17
A cylindrical coordinate system with dynamic permutation table for blowfish algorithm
Published 2014“…The combination of a DPT with a dynamic 3D S-box strengthens the resistance of the NBA against attacks and increases the randomness of the output.C++ is used in the implementation of both algorithms.The NIST tests are implemented under Linux.…”
Get full text
Get full text
Get full text
Article -
18
Design and implementation of multimedia digital matrix system
Published 2005“…Due to the issues of signal integrity in high-speed digital design, a new adaptive channel synchronization algorithm has been developed. …”
Get full text
Get full text
Conference or Workshop Item -
19
Estimation-based Metaheuristics: A New Branch of Computational Intelligence
Published 2016“…In evaluating the performance of the estimation-based algorithms, it is implemented to 30 benchmark functions of the CEC 2014 benchmark suite. …”
Get full text
Get full text
Conference or Workshop Item -
20
Efficient and secured compression and steganography technique in wireless sensor network
Published 2016“…In terms of security, the proposed solution is studied against brute-force attacks and the analysis shows that the new algorithm can withstand this type of attack with an ample amount of hiding possibilities that make the process of retrieving the message extremely diffi- cult. …”
Get full text
Get full text
Get full text
Thesis
