Search Results - (( policy implementation means algorithm ) OR ( java evolution optimization algorithm ))
Search alternatives:
- evolution optimization »
- policy implementation »
- implementation means »
- means algorithm »
- java »
-
1
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…The aim of this evolution is to reflect the unseen time overhead incurred by optimal real-time algorithm, represented by LRE-TL, which might hinder the claimed optimality of such algorithms when they are practically implemented. …”
Get full text
Get full text
Conference or Workshop Item -
2
-
3
Profiling network traffic of Sultan Idris Shah building (BSIS) using data mining technique / Rusmawati Ishak
Published 2018“…Orange is a tool that being used in implementing K-Means Clustering Algorithm that could be seen as the most suitable solution to find a network trend pattern of user accessing the Internet and to produce with profiling network. …”
Get full text
Get full text
Thesis -
4
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
Published 2021“…Some schemes have been proposed to deliver such access control using Ciphertext-policy attribute-based encryption (CP-ABE) that can enforce data owners’ access policies to achieve such cryptographic access control and tackle the majority of those concerns. …”
Get full text
Get full text
Thesis -
5
Optical Packet Switching Contention Resolution Based On A Hybrid Wavelength Conversion-Fiber Delay Line Scheme
Published 2004“…By means of simulation, the proposed scheme has been investigated and compared with the conventional baseline scheme. …”
Get full text
Get full text
Thesis -
6
Developing students' mathematical thinking: how far have we came?
Published 2015“…Several findings from studies that focused on students' ability to provide reasoning and give meanings to concepts and algorithms are highlighted. …”
Get full text
Get full text
Get full text
Inaugural Lecture -
7
An industrial IoT-based blockchain-enabled secure searchable encryption approach for healthcare systems using neural network
Published 2022“…The interconnection of devices means there is the possibility of challenges such as security, trustworthiness, reliability, confidentiality, and so on. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article
