Search Results - (( _ application service algorithm ) OR ( its application using algorithms ))*
Search alternatives:
- application service »
- service algorithm »
- using algorithms »
-
1
A Proposed False Report Identification Algorithm for a Mobile Application in the IoT Environment
Published 2024Proceedings Paper -
2
Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm
Published 2022“…Genetic algorithm was widely used because of its accuracy and simplicity. …”
Get full text
Get full text
Get full text
Academic Exercise -
3
Development Of Motion Planer And Navigation System For An Office Assistant Robot
Published 2021“…Besides, map was generated by using SLAM algorithm, the costmap was setup and the parameters such as inflation_dist and cost_scaling_factor was studied and tuned based on this application. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
Quality of service management algorithms in WiMAX networks
Published 2015“…Simulation have been extensively used to evaluate the proposed algorithm. Finally, Discrete Event Simulator (DES) is designed and developed in order to evaluate the performance of the proposed algorithms. …”
Get full text
Get full text
Thesis -
5
-
6
-
7
Fair Traffic Scheduling and Shaping Algorithms for Diffserv Networks
Published 2006“…As the Internet grows and becomes universally available, it becomes very important to deal with real time service delivery to application such as IP telephony. …”
Get full text
Get full text
Thesis -
8
A novel peak load shaving algorithm for isolated microgrid using hybrid PV-BESS system
Published 2021“…Peak shaving service can be found from this algorithm as a simple and forcible way. …”
Get full text
Get full text
Article -
9
Modelling and optimization of a transit services with feeder bus and rail system / Mohammadhadi Almasi
Published 2015“…In this study, optimized transit services and coordinated schedules are developed using metaheuristic algorithms such as genetic algorithm (GA), particle swarm optimization (PSO), water cycle algorithm (WCA) and imperialist competitive algorithm (ICA). …”
Get full text
Get full text
Thesis -
10
Application of Genetic Algorithm for the Reduction of Reactive Power Losses in Radial Distribution System
Published 2006“…ERACS is used to perform load flow analysis while MATLAB is used for the identification of capacitor current via GAtool, and algorithm for the calculation of loss savings, its particular capacitor size and location. …”
Get full text
Get full text
Conference or Workshop Item -
11
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Online Dynamic Replication and Placement Algorithms for Cost Optimization of Online Social Networks in Two-tier Multi-cloud
Published 2024journal::journal article -
13
Impatient job scheduling under cloud computing
Published 2012“…The limitations of those algorithms were addressed and this leads to the proposition of an algorithm that has the ability to map the impatient jobs to virtual machines near its input, output, application, or forth party. …”
Get full text
Get full text
Thesis -
14
-
15
Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment
Published 2011“…Besides, this algorithm provides home users or application developers to implement their own event operators with bespoke syntax for their application purpose by defining cross-events corresponding to the event operators. …”
Get full text
Get full text
Thesis -
16
Energy and performance efficient resource allocation for cloud-based data centers
Published 2015“…It’s offering hardware, software, infrastructure as a service form to the users. …”
Get full text
Get full text
Thesis -
17
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
18
Experimental performance analysis of job scheduling algorithms on computational grid using real workload traces
Published 2017“…This paper presents comparative performance analysis of our proposed job scheduling algorithm with other well known job scheduling algorithms considering the quality of service parameters. …”
Get full text
Get full text
Article -
19
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
20
Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari
Published 2017“…AES is being used widely in many applications since it is known for its faster encryption and decryption process and its strength. …”
Get full text
Get full text
Thesis
