Search Results - (( java estimation using algorithm ) OR ( policy implementation function algorithm ))
Search alternatives:
- implementation function »
- policy implementation »
- function algorithm »
- java estimation »
- using algorithm »
-
1
Multi-population kidney-inspired algorithm with migration policy selections for feature selection problems
Published 2025“…The initial algorithm, coded as MultiPop-KA, implements a predetermined migration policy. …”
Get full text
Get full text
Get full text
Article -
2
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. …”
Get full text
Get full text
Thesis -
3
Ant colony optimization algorithm for load balancing in grid computing
Published 2012“…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources.A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against other ant based algorithm, in terms of resource utilization. …”
Get full text
Get full text
Get full text
Monograph -
4
A hybrid model of system dynamics and genetic algorithm to increase crude palm oil production in Malaysia
Published 2018“…Furthermore, the hybrid model provides the ability of identifying the policy variables related to the objective function at any specific time line. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…The prototypes will be developed using JAVA language united with a MySQL database. Core functionality of the simulator are job generation, volunteer generation, simulating algorithms, generating graphical charts and generating reports. …”
Get full text
Get full text
Final Year Project -
6
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…The proposed method uses a rank accuracy estimation model to decide the rank-1 value to be applied for the decomposition. …”
Get full text
Get full text
Article -
7
Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing
Published 2011“…A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
Get full text
Get full text
Get full text
Thesis -
8
Resource management in grid computing using ant colony optimization
Published 2011“…Resources with high pheromone value are selected to process the submitted jobs.Global pheromone update is performed after completion processing the jobs in order to reduce the pheromone value of resources.A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against other ant based algorithm, in terms of resource utilization.Experimental results show that EACO produced better grid resource management solution.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
9
Estimation of dielectric constant for various standard materials using microstrip ring resonator
Published 2017“…The differences in frequency shift were used in NetBeans IDE 8.1 algorithm of Java for dielectric constant calculation. …”
Get full text
Get full text
Article -
10
JTAGGER
Published 2006“…In this project, rule-based tagging algorithm is used as the mechanism to develop the system which named JTagger. …”
Get full text
Get full text
Final Year Project -
11
RLMD-PA: A Reinforcement Learning-Based Myocarditis Diagnosis Combined with a Population-Based Algorithm for Pretraining Weights
Published 2024journal::journal article -
12
Effective downlink resource management for wimax networks
Published 2018“…Our EDRM framework involves three functions: Class-Based Scheduling (CBS) algorithm, Dynamic Bandwidth Allocation (DBA) scheme and Link Session Management (LSM) policy. …”
Get full text
Get full text
Thesis -
13
Performance Analysis Of Different Hash Functions Using Bloom Filter For Network Intrusion Detection Systems In 32-Bit And 64-Bit Computer Operation Mode.
Published 2016“…A Bloom Filter pattern matching algorithm with fast hashing functions is developed for 32-bit and 64-bit computer system. …”
Get full text
Get full text
Thesis -
14
Visualisation tool to study malaria transmission using network modelling
Published 2014“…Java was used to implement the visualisation tool. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
15
Controller placement problem in the optimization of 5G based SDN and NFV architecture
Published 2021“…The proposed energyaware routing algorithm (EARMCP) implements efficient flow routing mechanisms for network traffic to minimize the number of active links and 5G-DC devices. …”
Get full text
Get full text
Thesis -
16
Modified ant colony optimization algorithms for deterministic and stochastic inventory routing problems / Lily Wong
Published 2018“…The computational results show that the algorithms which implement this new formulation are able to produce better solutions. …”
Get full text
Get full text
Get full text
Thesis -
17
Deep Reinforcement Learning For Control
Published 2021“…To generate the visual simulation in the simulator, the Python programming language is employed. The improved algorithm will help encourage the real-world implementation of DRL in many autonomous driving applications.…”
Get full text
Get full text
Monograph -
18
Security framework based multi agent system architecture to facilitate data fetching from cloud data storage
Published 2012“…To simulate the agents, Oracle database packages and triggers are used to implement agent functions, and Oracle jobs are utilized to create agents. …”
Get full text
Get full text
Thesis -
19
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
Get full text
Get full text
Thesis -
20
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
Published 2021“…Some schemes have been proposed to deliver such access control using Ciphertext-policy attribute-based encryption (CP-ABE) that can enforce data owners’ access policies to achieve such cryptographic access control and tackle the majority of those concerns. …”
Get full text
Get full text
Thesis
