Search Results - (( its application service algorithm ) OR ( _ application ((use algorithm) OR (based algorithm)) ))
Search alternatives:
- application service »
- service algorithm »
- use algorithm »
-
1
-
2
Quality of service management algorithms in WiMAX networks
Published 2015“…Thirdly, an energy algorithm called the Efficient Battery Life-aware Power Saving (EBLAPS) algorithm is proposed to address the problems of minimizing energy at the expense of response due to how energy sleep parameters are adjusted based on the residual energy and the use of standard sleep mode algorithms consumes high energy because of frequent transition to listening mode in the case of light traffic. …”
Get full text
Get full text
Thesis -
3
Development Of Motion Planer And Navigation System For An Office Assistant Robot
Published 2021“…Besides, map was generated by using SLAM algorithm, the costmap was setup and the parameters such as inflation_dist and cost_scaling_factor was studied and tuned based on this application. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
Fuzzy Logic Based Self-Adaptive Handover Algorithm for MobileWiMAX.
Published 2013“…In this paper, a fuzzy logic based self-adaptive handover (FuzSAHO) algorithm is introduced. …”
Get full text
Get full text
Article -
5
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
6
Online Dynamic Replication and Placement Algorithms for Cost Optimization of Online Social Networks in Two-tier Multi-cloud
Published 2024journal::journal article -
7
Context aware traffic scheduling algorithm for power distribution smart grid network
Published 2023Article -
8
-
9
Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment
Published 2011“…Besides, this algorithm provides home users or application developers to implement their own event operators with bespoke syntax for their application purpose by defining cross-events corresponding to the event operators. …”
Get full text
Get full text
Thesis -
10
Experimental performance analysis of job scheduling algorithms on computational grid using real workload traces
Published 2017“…The main thrust of this work was to conduct a quality of service based experimental performance evaluation of job scheduling algorithms on computational Grid in true dynamic environment. …”
Get full text
Get full text
Article -
11
-
12
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
13
Enhancing Solutions Of Capacity Vehicle Routing Problem Based On An Improvement Ant Colony System Algorithm
Published 2019“…It serves an important task in logistics and supply procession administration appropriate toward its wide applications in transport, product delivery, and services. …”
Get full text
Get full text
Get full text
Article -
14
CONTEXT AWARE TRAFFIC SCHEDULING ALGORITHM FOR COMMUNICATION SYSTEM IN POWER DISTRIBUTION NETWORK
Published 2023“…The designated algorithm is tested with Multi-Protocol Label Switching (MPLS) protocol using Network Simulator 3 (NS-3) as a simulation platform. …”
text::Thesis -
15
Modelling and optimization of a transit services with feeder bus and rail system / Mohammadhadi Almasi
Published 2015“…In this study, optimized transit services and coordinated schedules are developed using metaheuristic algorithms such as genetic algorithm (GA), particle swarm optimization (PSO), water cycle algorithm (WCA) and imperialist competitive algorithm (ICA). …”
Get full text
Get full text
Thesis -
16
Impatient job scheduling under cloud computing
Published 2012“…The limitations of those algorithms were addressed and this leads to the proposition of an algorithm that has the ability to map the impatient jobs to virtual machines near its input, output, application, or forth party. …”
Get full text
Get full text
Thesis -
17
Cloudlet deployment and task offloading in mobile edge computing using variable-length whale and differential evolution optimization and analytical hierarchical process for decisio...
Published 2023“…Comparing this developed algorithm with other algorithms shows its superiority in multi-objective optimization (MOO) evaluation metrics. …”
Get full text
Get full text
Thesis -
18
Enhanced Privacy Protection Against Location-Dependent Attacks in Location Based Services Using Spatial Cloaking
Published 2020“…Use of Internet enabled mobile devices has facilitated the rapid Use of Internet enabled mobile devices has facilitated the rapid development of location-based services (LBS). …”
Get full text
Get full text
Article -
19
Task scheduling in cloud computing using hybrid genetic algorithm and bald eagle search (GA-BES)
Published 2022“…The genetic algorithm was widely used because of its accuracy and simplicity. …”
Get full text
Get full text
Get full text
Academic Exercise -
20
Enhanced privacy protection from location dependent attacks in location based services using spatial cloaking
Published 2020“…Use of Internet enabled mobile devices has facilitated the rapid development of location-based services (LBS). …”
Get full text
Get full text
Get full text
Article
