Search Results - (( based application service algorithm ) OR ( _ applications matching algorithm ))*
Search alternatives:
- applications matching »
- application service »
- based application »
- service algorithm »
- _ applications »
-
1
-
2
Adaptive web service selection based on data type matching for dynamic web service composition
Published 2015Get full text
Get full text
Get full text
Conference or Workshop Item -
3
CONTEXT AWARE TRAFFIC SCHEDULING ALGORITHM FOR COMMUNICATION SYSTEM IN POWER DISTRIBUTION NETWORK
Published 2023“…It proves that the contextual aware ranking of each traffic are correctly matched to one another. In order to verify the advantages of the proposed algorithm, it is compared with simulation results without contextual aware algorithm. …”
text::Thesis -
4
-
5
Hybrid firefly and particle swarm optimization algorithm for multi-objective optimal power flow with distributed generation
Published 2022“…The proposed algorithm is simulated for simultaneous OPF-based conflicting objectives, respectively. …”
Get full text
Get full text
Thesis -
6
Semantic-Based, Scalable, Decentralized and Dynamic Resource Discovery for Internet-Based Distributed System
Published 2010“…Resource Discovery (RD) is a key issue in Internet-based distributed sytems such as grid. RD is about locating an appropriate resource/service type that matches the user’s application requirements. …”
Get full text
Get full text
Thesis -
7
Semantic-Based, Scalable, Decentralized and Dynamic Resource Discovery for Internet-Based Distributed System
Published 2010“…Resource Discovery (RD) is a key issue in Internet-based distributed sytems such as grid. RD is about locating an appropriate resource/service type that matches the user's application requirements. …”
Get full text
Get full text
Thesis -
8
Scalable Self-Organizing Model for Grid Resource Discovery
Published 2008“…In order to build Grid resource sharing environment, one of the basic problems is to locate one or more entities (e.g. CPU, memory, OS, applications) that match a provided description; this is called resource discovery process. …”
Get full text
Get full text
Conference or Workshop Item -
9
User authentication in public cloud computing through adoption of electronic personal synthesis behavior
Published 2023text::Thesis -
10
A Linear Prediction Based Estimation of Signal-to-Noise Ratio in AWGN Channel
Published 2007“…The proposed estimator uses the characteristics of the second order moments of the additive white Gaussian noise digital communication channel and a linear predictor based on the modified-covariance algorithm in estimating the SNR value. …”
Get full text
Get full text
Article -
11
Lightweight ontology architecture for QoS aware service discovery and semantic CoAP data management in heterogeneous IoT environment
Published 2026“…User requests, transmitted via the Constrained Application Protocol (CoAP), are semantically enriched and matched to QoS parameters using Dynamic Shannon Entropy optimized with the Salp Swarm Algorithm. …”
Get full text
Get full text
Get full text
Article -
12
-
13
A Linear Prediction Based Estimation of Signal-to-Noise Ratio in AWGN Channel
Published 2007“…The proposed estimator uses the characteristics of the second order moments of the additive white Gaussian noise digital communication channel and a linear predictor based on the modified-covariance algorithm in estimating the SNR value. …”
Get full text
Get full text
Get full text
Article -
14
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…The main algorithms used are profile determination and user similarity. …”
Get full text
Get full text
Thesis -
15
A linear prediction based estimation of signal-to-noise ratio in AWGN channel
Published 2007“…The proposed estimator uses the characteristics of the second order moments of the additive white Gaussian noise digital communication channel and a linear predictor based on the modified-covariance algorithm in estimating the SNR value. …”
Get full text
Get full text
Get full text
Article -
16
-
17
ios Mobile Malware Deep Analysis And Classification For Social Media And Online Banking Exploitation
Published 2024thesis::master thesis -
18
Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence
Published 2011“…To improve the UHDS16 algorithm, 8 × 8 block-matching technique has been tested. …”
Get full text
Get full text
Get full text
Book Chapter -
19
-
20
