Search Results - (( java simulation optimisation algorithm ) OR ( policy implementation among algorithm ))

  • Showing 1 - 18 results of 18
Refine Results
  1. 1

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…Despite the implementation of the mentioned core functionalities of a desktop grid simulator, advanced features such as viewing real-time graphical charts, generating PDF reports of the simulation result and exporting the final result as CSV files has been also included among the other features.…”
    Get full text
    Get full text
    Final Year Project
  2. 2

    The effect of government policy on the relationship between organizational factors and construction waste management in Abuja, Nigeria by Nasidi, Yusuf

    Published 2016
    “…Poor motivation for the implementation of the construction on-site waste reduction, insufficient waste management skills, the shortage of appropriately designed and decently handled landfill system, lack of team work, unequal workload and task distribution among the divisions is the result of poor organizational structure among construction organizations in Nigeria. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure policies for the distributed virtual machines in mobile cloud computing by Annane, Boubakeur

    Published 2020
    “…It enhances the grants access authorization for permitted distributed intensive applications’ tasks. Furthermore, an algorithm that enables secure communication among distributed VMs and protection of sensitive data in VMs on the cloud is proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7

    Malaysia residential load profile management based on time of use tariff using ant colony optimization algorithm by Dahlan, Nofri Yenita, Sulaima, Mohamad Fani, Wan Hanapi, Wan Noor Azzyati, Noor Din, Muhamad Muhtazam

    Published 2022
    “…However, such an energy management policy is usually geared towards industrial and commercial consumers’ but rarely towards residential consumers. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Government policy as a key moderator to contractors’ risk attitudes among Malaysian construction companies by Taofeeq, D. M., Adeleke, A. Q., Lee, Chia Kuang

    Published 2020
    “…The purpose of this paper is to identify the critical factors affecting contractors’ risk attitudes among Malaysian construction companies with the moderating role of government policy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Modified ant colony optimization algorithms for deterministic and stochastic inventory routing problems / Lily Wong by Lily , Wong

    Published 2018
    “…Among the two proposed algorithms, that is, ACO and ACO2, ACO2 outperform than ACO. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Performance Analysis Of Different Hash Functions Using Bloom Filter For Network Intrusion Detection Systems In 32-Bit And 64-Bit Computer Operation Mode. by Tan , Beng Ghee

    Published 2016
    “…The implemented hashes are Murmur2 Hash, City Hash, One-at-a-time Hash, SuperFast Hash, and Lookup3 Hash. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Effective downlink resource management for wimax networks by Shareef, Zayd Ashraf Najeeb

    Published 2018
    “…Our EDRM framework involves three functions: Class-Based Scheduling (CBS) algorithm, Dynamic Bandwidth Allocation (DBA) scheme and Link Session Management (LSM) policy. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Reimagining English language learning: a systematic review of AI integration in classroom practice (2019–2024) by Ibrahim Brian, Muhammad Shyazzwan

    Published 2025
    “…This model serves as a practical guide for educators and stakeholders aiming to implement AI-enhanced pedagogies responsibly. Ultimately, the study underscores the need for interdisciplinary collaboration among educators, policymakers, and technology developers to foster sustainable and inclusive learning environments. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Dynamic approaches for spectrum control in cognitive radio networks by Mohamedou, Ahmed

    Published 2015
    “…Interior-Point Method is used to find the best spectrum sharing and medium access policy to achieve this objective. The second solution assumes the autonomy of secondary users where the decision to update transmiss on power is distributed among users. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Cooperative heterogeneous vehicular clustering for road traffic management / Iftikhar Ahmad by Iftikhar , Ahmad

    Published 2019
    “…A control mechanism is defined as well to control the non-cooperative behavior and fair-use policy among CMs. Furthermore, a self-location calculation algorithm is developed to enable vehicles to calculate their location in the absence of global positioning system (GPS) signals. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing by Jamal, Fara

    Published 2021
    “…Some schemes have been proposed to deliver such access control using Ciphertext-policy attribute-based encryption (CP-ABE) that can enforce data owners’ access policies to achieve such cryptographic access control and tackle the majority of those concerns. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Optical Packet Switching Contention Resolution Based On A Hybrid Wavelength Conversion-Fiber Delay Line Scheme by Go, Yun Ii

    Published 2004
    “…Consequently, contention resolution in wavelength domain has attracted considerable interest among the optical communications community instead of implementing optical buffering and deflection routing that have been studied previously. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Carbon dioxide management for product supply chain and total site utilisation and storage by Mohd Nawi, Wan Norlinda Roshana

    Published 2018
    “…An algebraic approach called CO2 utilisation and storage-problem table algorithm is proposed to obtain total site target for integration of CO2 utilisation and storage. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Transformer asset management based on Markov Prediction Model utilizing health index by Yahaya, Muhammad Sharil

    Published 2019
    “…Transformers are considered among the important assets in a power system network, failures of which could lead to costly consequences. …”
    Get full text
    Get full text
    Thesis