Search Results - (( simulation organization matching algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 7 results of 7
Refine Results
  1. 1
  2. 2

    An integrated algorithm of analytical network process with case-based reasoning to support the selection of an ideal football team formation and players by Mohammad Zukuwwan, Zainol Abidin

    Published 2021
    “…The system is organized into two combined components: weight calculation for each player to estimate their strength and simulation for suitable formation when facing opponents. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Iterative And Single-Step Solutions Of Two Dimensional Time-Domain Inverse Scattering Problem Featuring Ultra Wide Band Sensors by Binajjaj, Saeed Ali Saeed

    Published 2010
    “…Finally, the algorithms‘ robustness against the noisy data was evaluated using two simulated experiments with signal-to-noise ratios of 6 and 8 dB respectively.…”
    Get full text
    Get full text
    Thesis
  4. 4

    Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing by Husna, Jamal Abdul Nasir

    Published 2011
    “…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources. A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7

    The development of secure interface system for wi-fi internet access using blended approach of captive portals and key verification techniques / Kamarul Ariffin Abdul Basit … [et a... by Abdul Basit, Kamarul Ariffin, Awang, Norkhushaini, Darus, Mohammad Yusof, Mohd Ali, Fakariah Hani

    Published 2014
    “…The key of a particular user has to match with his/her account. When a registered user wants to use the Internet via the organization’s access point, he/she has to login to the SiS by supplying the correct username and password as well as the key. …”
    Get full text
    Get full text
    Get full text
    Book Section