Search alternatives:
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
-
1
Efficient Dynamic Cost Scheduling Algorithm for Data Batch Processing
Published 2016Get full text
doctoralThesis -
2
Efficient Dynamic Cost Scheduling Algorithm for Financial Data Supply Chain
Published 2021“…The primary tool used in the data supply chain is data batch processing which requires efficient scheduling. …”
Get full text
article -
3
-
4
Minimizing Deadline Misses of Mobile IoT Requests in a Hybrid Fog- Cloud Computing Environment
Published 2019Subjects: Get full text
doctoralThesis -
5
Optimizing Energy Consumption of Cloud Computing IaaS
Published 2017Subjects: Get full text
doctoralThesis -
6
GENETIC SCHEDULING OF TASK GRAPHS
Published 2020“…A genetic algorithm for scheduling computational task graphs is presented. …”
Get full text
article -
7
GIJA:Enhanced geyser‐inspired Jaya algorithm for task scheduling optimization in cloud computing
Published 2024“…In this article, we introduce GIJA (Geyser‐inspired Jaya Algorithm), a novel optimization approach tailored for task scheduling in cloud computing environments. …”
Get full text
-
8
-
9
Efficient Prioritization and Processor Selection Schemes for HEFT Algorithm: A Makespan Optimizer for Task Scheduling in Cloud Environment
Published 2022“…Among these methods, the Heterogeneous Earliest Finish Time (HEFT) algorithm is recognized to produce optimal outcomes in a shorter time period for scheduling tasks in a heterogeneous environment. …”
-
10
Proactive Fault Tolerance and Minimizing Task Execution Failure in A Cloud Data Center
Published 2024Get full text
doctoralThesis -
11
-
12
A simulated evolution approach to task-matching and scheduling in heterogeneous computing environments
Published 2020“…Abstract This paper applies a simulated evolution (SE) approach to the problem of matching and scheduling dependent tasks in a heterogeneous suite of computers interconnected via a high-speed network. …”
Get full text
article -
13
-
14
An Uncertainty Based Genetic Algorithm Approach for Project Resource Scheduling
Published 2016“…Several nonlinear optimization models were developed for this purpose assuming uniform resource availability and sequence based project tasks. The work presented in thesis add to the existing literature in a proposing the use of a genetic algorithm uncertain approach to resource- scheduling in projects. …”
Get full text
-
15
Cryptocurrency Exchange Market Prediction and Analysis Using Data Mining and Artificial Intelligence
Published 2020“…One of the best algorithms in terms of the result is the Long Short Term Memory (LSTM) since it is based on recurrent neural networks which uses loop as a method to learn from heuristics data. …”
Get full text
-
16
Allocation and re-allocation of data in a grid using an adaptive genetic algorithm
Published 2006“…Allocation and re-allocation of data in a grid using an adaptive genetic algorithm. …”
Get full text
Get full text
Get full text
conferenceObject -
17
-
18
Efficient Approximate Conformance Checking Using Trie Data Structures
Published 2021“…By encoding the proxy behavior using a trie data structure, we obtain a logarithmically reduced search space for alignment computation compared to a set-based representation. …”
Get full text
Get full text
Get full text
-
19
A deterministic heuristic algorithm for optimal multiprocessor scheduling. (c1995)
Published 1995Get full text
Get full text
masterThesis -
20
Multilayer Reversible Data Hiding Based on the Difference Expansion Method Using Multilevel Thresholding of Host Images Based on the Slime Mould Algorithm
Published 2022“…Moreover, the image pixels in different and more similar areas of the image are located next to one another in a group and classified using the specified thresholds. As a result, the embedding capacity in each class can increase by reducing the value of the difference between two consecutive pixels, and the distortion of the marked image can decrease after inserting the personal data using the DE method. …”
Get full text