Search Results - (( java simulation optimisation algorithm ) OR ( policy implementation among algorithm ))
Search alternatives:
- simulation optimisation »
- optimisation algorithm »
- policy implementation »
- implementation among »
- java simulation »
- among algorithm »
-
1
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…Despite the implementation of the mentioned core functionalities of a desktop grid simulator, advanced features such as viewing real-time graphical charts, generating PDF reports of the simulation result and exporting the final result as CSV files has been also included among the other features.…”
Get full text
Get full text
Final Year Project -
2
The effect of government policy on the relationship between organizational factors and construction waste management in Abuja, Nigeria
Published 2016“…Poor motivation for the implementation of the construction on-site waste reduction, insufficient waste management skills, the shortage of appropriately designed and decently handled landfill system, lack of team work, unequal workload and task distribution among the divisions is the result of poor organizational structure among construction organizations in Nigeria. …”
Get full text
Get full text
Get full text
Thesis -
3
Comparison of PPO and SAC Algorithms towards decision making strategies for collision avoidance among multiple autonomous vehicles
Published 2021Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Secure policies for the distributed virtual machines in mobile cloud computing
Published 2020“…It enhances the grants access authorization for permitted distributed intensive applications’ tasks. Furthermore, an algorithm that enables secure communication among distributed VMs and protection of sensitive data in VMs on the cloud is proposed. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
-
6
-
7
Malaysia residential load profile management based on time of use tariff using ant colony optimization algorithm
Published 2022“…However, such an energy management policy is usually geared towards industrial and commercial consumers’ but rarely towards residential consumers. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Government policy as a key moderator to contractors’ risk attitudes among Malaysian construction companies
Published 2020“…The purpose of this paper is to identify the critical factors affecting contractors’ risk attitudes among Malaysian construction companies with the moderating role of government policy. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Modified ant colony optimization algorithms for deterministic and stochastic inventory routing problems / Lily Wong
Published 2018“…Among the two proposed algorithms, that is, ACO and ACO2, ACO2 outperform than ACO. …”
Get full text
Get full text
Get full text
Thesis -
10
Performance Analysis Of Different Hash Functions Using Bloom Filter For Network Intrusion Detection Systems In 32-Bit And 64-Bit Computer Operation Mode.
Published 2016“…The implemented hashes are Murmur2 Hash, City Hash, One-at-a-time Hash, SuperFast Hash, and Lookup3 Hash. …”
Get full text
Get full text
Thesis -
11
Effective downlink resource management for wimax networks
Published 2018“…Our EDRM framework involves three functions: Class-Based Scheduling (CBS) algorithm, Dynamic Bandwidth Allocation (DBA) scheme and Link Session Management (LSM) policy. …”
Get full text
Get full text
Thesis -
12
Reimagining English language learning: a systematic review of AI integration in classroom practice (2019–2024)
Published 2025“…This model serves as a practical guide for educators and stakeholders aiming to implement AI-enhanced pedagogies responsibly. Ultimately, the study underscores the need for interdisciplinary collaboration among educators, policymakers, and technology developers to foster sustainable and inclusive learning environments. …”
Get full text
Get full text
Get full text
Article -
13
Dynamic approaches for spectrum control in cognitive radio networks
Published 2015“…Interior-Point Method is used to find the best spectrum sharing and medium access policy to achieve this objective. The second solution assumes the autonomy of secondary users where the decision to update transmiss on power is distributed among users. …”
Get full text
Get full text
Thesis -
14
Cooperative heterogeneous vehicular clustering for road traffic management / Iftikhar Ahmad
Published 2019“…A control mechanism is defined as well to control the non-cooperative behavior and fair-use policy among CMs. Furthermore, a self-location calculation algorithm is developed to enable vehicles to calculate their location in the absence of global positioning system (GPS) signals. …”
Get full text
Get full text
Get full text
Thesis -
15
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
Published 2021“…Some schemes have been proposed to deliver such access control using Ciphertext-policy attribute-based encryption (CP-ABE) that can enforce data owners’ access policies to achieve such cryptographic access control and tackle the majority of those concerns. …”
Get full text
Get full text
Thesis -
16
Optical Packet Switching Contention Resolution Based On A Hybrid Wavelength Conversion-Fiber Delay Line Scheme
Published 2004“…Consequently, contention resolution in wavelength domain has attracted considerable interest among the optical communications community instead of implementing optical buffering and deflection routing that have been studied previously. …”
Get full text
Get full text
Thesis -
17
Carbon dioxide management for product supply chain and total site utilisation and storage
Published 2018“…An algebraic approach called CO2 utilisation and storage-problem table algorithm is proposed to obtain total site target for integration of CO2 utilisation and storage. …”
Get full text
Get full text
Thesis -
18
Transformer asset management based on Markov Prediction Model utilizing health index
Published 2019“…Transformers are considered among the important assets in a power system network, failures of which could lead to costly consequences. …”
Get full text
Get full text
Thesis
