Search Results - (( based application service algorithm ) OR ( _ application modified algorithm ))*
Search alternatives:
- application modified »
- application service »
- based application »
- service algorithm »
-
1
Enhancing the QoS performance for mobile station over LTE and WiMAX networks / Mhd Nour Hindia
Published 2015“…On the second level, TOPSIS algorithm allocates resources among an application’s user based on their criteria and the application’s preferences. …”
Get full text
Get full text
Thesis -
2
Modified workflow scheduling using hybrid PSO-GA algorithm in cloud computing
Published 2019“…Cloud computing environment offers customers with multiple on-demand services and resource sharing. Business processes are managed using cloud-based workflow technology, which is one of the difficulties of using resources efficiently owing to the inter-task dependencies. …”
Get full text
Get full text
Thesis -
3
-
4
A novel scheduling algorithm based on game theory and multicriteria decision making in LTE network
Published 2015“…On the second level, TOPSIS algorithm allocates the resources among application's users based on their criteria and the application's preferences. …”
Get full text
Get full text
Get full text
Article -
5
A novel LTE scheduling algorithm for green technology in smart grid
Published 2015“…The technique allocates available network resources based on application's priority, whereas the algorithm makes scheduling decision based on dynamic weighting factors of multi-criteria to satisfy the demands (delay, past average throughput and instantaneous transmission rate) of quality of service. …”
Get full text
Get full text
Get full text
Article -
6
Hybrid metaheuristics for QOS-aware service composition / Hadi Naghavipour
Published 2022“…With the advent of Service-Oriented Architecture (SOA), services can be registered, invoked, and combined by their identical Quality of Services (QoS) attributes to create a new value-added application that fulfils user requirements. …”
Get full text
Get full text
Get full text
Thesis -
7
Statistically controlled robust trust computing mechanism for cloud computing
Published 2014“…Trust computing mechanisms can play an important role in identifying the right service providers who would meet the commitments specified in the Service Level Agreements.Literature has reported several trust computing mechanisms for different distributed systems based on various algorithms and functions.Almost all of them modify the trust scores monotonously even for momentary performance deviations that are reported.This paper proposes a trust computing mechanism that statistically validates the attribute monitored before modifying the trust scores using a hysteresis based algorithm.Hence the proposed mechanism can protect the trust scores from changes due to momentary fluctuations in system performances.The experiments conducted show that the trust scores computed using the proposed mechanism are more representative of the long-term system performance than the ones that were computed without the validation of the inputs.…”
Get full text
Get full text
Get full text
Article -
8
-
9
-
10
A genetic algorithm for two-dimensional bin packing with due dates
Published 2013Get full text
Get full text
Article -
11
Quality of service and scheduling performance optimization in LTE networks / Abubakar Auwal Idris
Published 2017“…The performance of the developed VRTSA is evaluated and compared with three well-known downlink scheduling algorithms in LTE such as Proportional Fair (PF), Modified Largest Weight Delay First (MLWDF), Exponential Proportional Fair (EXP/PF) as well as recent algorithm called LTTI. …”
Get full text
Get full text
Get full text
Thesis -
12
Security analysis of data transmission in an IoT based platform for telemedicine
Published 2021“…This study proposes a modified folded pipeline architecture for resource restriction applications with an AES algorithm. …”
Get full text
Get full text
Get full text
Article -
13
An Efficient Route Selection Based on AODV Algorithm for VANET
Published 2016Get full text
Get full text
Get full text
Conference or Workshop Item -
14
-
15
An Efficient Route Selection based on AODV Algorithm for VANET
Published 2016Get full text
Get full text
Get full text
Article -
16
An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi
Published 2021“…This research aim is to study the performance of an improvised Genetic Algorithm (GA) by formulating its problem-specific algorithm for network intrusion problem. …”
Get full text
Get full text
Thesis -
17
Modem Recognition Algorithm for Software Defined Radio Base Station
Published 2004Get full text
Get full text
Thesis -
18
Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector
Published 2018“…Since AODV has no security mechanisms, malicious nodes can perform many attacks just by not behaving according to the AODV rules, so that our framework can provide secure communication in VANET via modifying AODV. Our framework categorises the requirements for the VANET protection design via modifying AODV into three: Insure the Availability of VANET and its Services Algorithm (IAVSA), Protect Data Dissemination Algorithm (PDDA), and Secure Vehicles Authentication Algorithm (SVAA). …”
Get full text
Get full text
Get full text
Thesis -
19
Predicting Customer Buying Decisions for Online Shopping with Unbalanced Data Set
Published 2022Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
