Search Results - (( variable objective scheduling algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- application mining »
- java application »
- mining algorithm »
- variable »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
A hybrid heuristic of variable neighbourhood descent and great deluge algorithm for efficient task scheduling in grid computing
Published 2019“…In this paper, we propose a novel hybrid heuristic-based algorithm, which synergised the excellent diversification capability of Great Deluge (GD) algorithm with the powerful systematic multi-neighbourhood search strategy captured in Variable Neighbourhood Descent (VND) algorithm, to efficiently schedule independent tasks in Grid computing environment with an objective of minimising the makespan. …”
Get full text
Get full text
Get full text
Article -
4
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
5
The use of heuristic ordering and particle swarm optimization for nurse scheduling problem
Published 2017“…The comparison of the result of HOPSO, harmony search algorithm (HSA) and heuristic variable neighborhood search (HVNS) is presented. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Hybrid dynamic scheduling model for flexible manufacturing system with machine availability and new job arrivals
Published 2015“…The performance of the schedules as produced by the scheduling/rescheduling algorithms were investigated and compared. …”
Get full text
Get full text
Thesis -
7
Improving resource management with multi-instance broker scheduling algorithm in hierarchical grid computing
Published 2016“…Multi-Instance Broker Scheduling Algorithm (MiBSA) has been proposed as a new scheduling algorithm to get rid of the drawback from the iHLBA algorithm. …”
Get full text
Get full text
Get full text
Thesis -
8
-
9
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Optimization of Upstream Offshore Oilfield Production Planning under Uncertainty and Downstream Crude Oil Scheduling at Refinery Front-End
Published 2012“…The solution obtained from the LB–MILP model, i.e., the decision variables (binary variables), was used to obtain a feasible solution for model UB–NLP. …”
Get full text
Get full text
Final Year Project -
12
Optimization of Upstream Offshore Oilfield Production Planning under Uncertainty and Downstream Crude Oil Scheduling at Refinery Front-End
Published 2009“…The solution obtained from the LB-MILP model, i.e., the decision variables (binary variables), was used to obtain a feasible solution for model UB-NLP. …”
Get full text
Get full text
Final Year Project -
13
Optimization Algorithms: A Comparison Study for Scheduling Problem at UIN Raden Fatah's Sharia and Law Faculty
Published 2024“…The research encompasses a systematic approach, beginning with a clear definition of constraints and objectives, followed by designing and implementing both algorithms to address the scheduling issues at the Faculty of Sharia and Law. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
15
Variable Neighborhood Descent and Whale Optimization Algorithm for Examination Timetabling Problems at Universiti Malaysia Sarawak
Published 2025“…A constructive algorithm was developed to generate an initial feasible solution, which was subsequently refined using two primary approaches to evaluate their efficiency: Iterative Threshold Pipe Variable Neighborhood Descent (IT-PVND), and a modified Whale Optimization Algorithm (WOA). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Optimizing the placement of fire department in Kulim using greedy heuristic and simplex method / Muhammad Abu Syah Mohd Suzaly
Published 2023“…BIP is used to solve a wide range of problems, such as resource allocation, scheduling, and network design. The objective of this project is to determine the best location for the fire department that gives the maximum coverage of safety, to minimize the total number of fire department by using greedy heuristic algorithm and simplex method and compared both method that gives the best solution for optimization. …”
Get full text
Get full text
Thesis -
17
OPTIMIZATION OF TWO FISH ENCRYPTION ALGORITHM ON FPGA
Published 2004“…There is also Reed-Solomon code with the MDS property used in the key schedule; this doesn't add diffusion to the cipher but does add diffusion to the key schedule.) …”
Get full text
Get full text
Final Year Project -
18
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
19
Optimal operation and control of hybrid power systems with stochastic renewables and FACTS devices: An intelligent multi-objective optimization approach
Published 2025“…Employing both single- and multi-objective optimization algorithms, the research addresses the OPF problem in a modified IEEE-30 bus system through various case studies. …”
Article -
20
Optimization Of Twofish Encryption Algorithm On FPGA
Published 2005“…There is also Reed-Solomon code with the MDS property used in the key schedule; this doesn't add diffusion to the cipher but does add diffusion to the key schedule.) …”
Get full text
Conference or Workshop Item
