Zobrazeno 1 - 10
of 44
pro vyhledávání: '"Amol C. Adamuthe"'
Autor:
Amol C. Adamuthe, Smita M. Kagwade
Publikováno v:
Decision Science Letters, Vol 11, Iss 2, Pp 113-126 (2022)
Data Center energy usage has risen dramatically because of the rapid growth and demand for cloud computing. This excessive energy usage is a challenge from an economic and environmental point. Virtual Machine Placement (VMP) along with virtualization
Externí odkaz:
https://doaj.org/article/ef727ae884564b2386fb540085637240
Autor:
Amol C. Adamuthe, Tushar Nitave
Publikováno v:
Decision Science Letters, Vol 9, Iss 4, Pp 581-594 (2020)
Bin packing problem is a constrained optimization problem with a huge search space due to large combinations. Bin packing problem has a wide range of applications in multiple fields. This paper presents harmony search algorithm with different initial
Externí odkaz:
https://doaj.org/article/ac273089752847b2820a7fe0ed8c1282
Publikováno v:
EAI Endorsed Transactions on Energy Web, Vol 7, Iss 28 (2020)
INTRODUCTION: The artificial bee colony (ABC) algorithm is a nature-inspired technique used for solving different optimization problems. This paper presents a multi-hive ABC algorithm for solving constrained benchmark functions of CEC2006. The CEC200
Externí odkaz:
https://doaj.org/article/9dd81303f1204a09b8f24b0a2ce251b9
Autor:
Amol C Adamuthe, Vrushabh D Kupwade
Publikováno v:
EAI Endorsed Transactions on Energy Web, Vol 11 (2024)
Investigation for minimizing energy consumption in data centers is increasing due to their heavy usage. In a data center, virtual machine placement is a procedure that maps virtual machines to physical machines. VMP problem is a complex combinatorial
Externí odkaz:
https://doaj.org/article/6c6790b20d824bedaa696a72fe1ba623
Autor:
Amol C. Adamuthe, Sumit S. Lad
Publikováno v:
International Journal of Computer Network and Information Security. 12:30-43
Malware is a threat to people in the cyber world. It steals personal information and harms computer systems. Various developers and information security specialists around the globe continuously work on strategies for detecting malware. From the last
Autor:
Abdulhameed Pathan, Amol C. Adamuthe
Publikováno v:
Open Computer Science, Vol 11, Iss 1, Pp 437-460 (2021)
Wireless sensor networks (WSNs) have grown widely due to their application in various domains, such as surveillance, healthcare, telecommunication, etc. In WSNs, there is a necessity to design energy-efficient algorithms for different purposes. Load
Autor:
Madhuri T. Sathe, Amol C. Adamuthe
Publikováno v:
International Journal of Modern Education and Computer Science. 13:1-21
Autor:
Aboli Sundarkar, Amol C. Adamuthe
Publikováno v:
Journal of Scientific Research. 65:117-126
Autor:
Amol C. Adamuthe, Manoj A. Patil
Publikováno v:
Journal of Engineering Education Transformations. 34:61-74
IT industries expect critical & analytical thinking, programming skills, domain & technology knowledge and soft skills from CS/IT graduates. There is a need for investigation of outcome-based methods to inculcate complex problem-solving skills among
Autor:
Tushar R. Nitave, Amol C. Adamuthe
Publikováno v:
Decision Science Letters, Vol 9, Iss 4, Pp 581-594 (2020)
Bin packing problem is a constrained optimization problem with a huge search space due to large combinations. Bin packing problem has a wide range of applications in multiple fields. This paper presents harmony search algorithm with different initial