Search Results - (( java application modified algorithm ) OR ( policy implementation framework algorithm ))
Search alternatives:
- implementation framework »
- policy implementation »
- application modified »
- java application »
-
1
-
2
A federated usage control framework with ontology-based policy and elimination of irrelevant rules set algorithm for grid computing authorization
Published 2019“…The results indicate that, by implementing the UBACO, the weighted comprehensive complexity is reduced by 40.5% as compared to the UCON based policy proposed by Martinelli and Mori (2010). …”
Get full text
Get full text
Thesis -
3
Multi-population kidney-inspired algorithm with migration policy selections for feature selection problems
Published 2025“…The initial algorithm, coded as MultiPop-KA, implements a predetermined migration policy. …”
Get full text
Get full text
Get full text
Article -
4
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
5
Runtime pluggable CPU scheduler for linux operating system
Published 2010“…In this thesis a Linux based framework, Runtime Pluggable Scheduling Policies framework, has been proposed to allow switching between the scheduling policies on the CPU scheduler during run-time. …”
Get full text
Get full text
Thesis -
6
Smart grid: Bio-inspired algorithms energy distributions for data centers
Published 2025“…The system is implemented and simulated using the CloudSim Plus framework under both homogeneous and heterogeneous data centre environments. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Enhanced Mobility Solution In Mobile Ipv6 Network
Published 2008“…The interface selection algorithm was based on NEMO implementation structure using a technique of mutihoming which was extended to MIPv6 concepts The outcome of this research work are: a designed policy protocol for policy messages communication between the Mobile Router and the Home Agent, the framework is simulated using Network Simulator (NS2) with an extension of mobiwan, the result shows the end to end delay, average end to end delay, overhead, optimal routing path, average inter-packet latency and throughput of the developed system. …”
Get full text
Get full text
Thesis -
8
Ethical considerations for equitable outcome-based education in the Metaverse: a qualitative study
Published 2025“…Recommendations emerging from the study include equity-first design principles, theoretical assessment frameworks, robust data governance policies, and culturally responsive pedagogical approaches. …”
Get full text
Get full text
Get full text
Article -
9
Development of hierarchical analytical scheduling (HAS) - a conceptual framework.
Published 2012Get full text
Conference or Workshop Item -
10
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
11
Effective downlink resource management for wimax networks
Published 2018“…It aims to achieve QoS assurances and high network performance for better user experiences. Our EDRM framework involves three functions: Class-Based Scheduling (CBS) algorithm, Dynamic Bandwidth Allocation (DBA) scheme and Link Session Management (LSM) policy. …”
Get full text
Get full text
Thesis -
12
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
Get full text
Get full text
Conference or Workshop Item -
13
Ethical considerations for equitable outcome-based education in the metaverse: a qualitative study
Published 2025“…Recommendations emerging from the study include equity-first design principles, theoretical assessment frameworks, robust data governance policies, and culturally responsive pedagogical approaches. …”
Get full text
Get full text
Get full text
Article -
14
End-to-End Security Mechanism Using Blockchain for Industrial Internet of Things
Published 2025“…Additionally, the IIoT environment can benefit from implementing security frameworks that reflect their characteristics. …”
Get full text
Get full text
Get full text
Article -
15
Security framework based multi agent system architecture to facilitate data fetching from cloud data storage
Published 2012“…GSecaaS is quantitatively and qualitatively evaluated to determine the most appropriate security policies to the development of cloud security algorithm. …”
Get full text
Get full text
Thesis -
16
Quantification and segmentation of breast cancer diagnosis: efficient hardware accelerator approach
Published 2022“…The mammogram database's initial test segment is critical for evaluating performance and determining the Area Under the Curve (AUC) to alias with medical policy. In addition, a new image clustering algorithm anticipates the need for largescale serial and parallel processing. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Poverty risk prediction based on socioeconomic factors using machine learning approach
Published 2025“…Although the research is limited with respect to its sample size and geographical scope, it has provided important findings that can be used when implementing data-driven methods in social policy formulation and poverty mitigation strategies.…”
Get full text
Get full text
Student Project -
18
The effect of government policy on the relationship between organizational factors and construction waste management in Abuja, Nigeria
Published 2016“…Lack of frequent staff training, performance management and human resource management practices and the problems of waste management regulations is the result of improper enforcement of waste management policy and planning framework for waste management. …”
Get full text
Get full text
Get full text
Thesis -
19
Dynamic investment model for the restructed power market in the presence of wind source
Published 2014“…The proposed framework has been implemented in the hypothetical restructured power market using the IEEE Reliability Test System. …”
Get full text
Get full text
Thesis -
20
Optimal design of low-voltage distribution networks for CO2 emission minimisation. Part II: Discrete optimisation of radial networks and comparison with alternative design strategi...
Published 2011“…The implementation of the network design algorithm is illustrated for a realistic large low-voltage urban network in a UK framework. …”
Get full text
Get full text
Get full text
Article
