Search Results - (( some applications a algorithm ) OR ( _ application service algorithm ))*
Search alternatives:
- application service »
- some applications »
- service algorithm »
- applications a »
- a algorithm »
-
1
Fair Traffic Scheduling and Shaping Algorithms for Diffserv Networks
Published 2006“…The thesis also proposed a new scheduling algorithm (FWFQ) which suite the DiffServ architecture and it gives a better performance in terms of delay and jitter. …”
Get full text
Get full text
Thesis -
2
Dynamic Feedback Flow Control Algorithms for Unicast and Multicast Available Bit Rate Service in Asynchronous Transfer Mode Networks
Published 2000“…In particular, the ABR service has been approved to use the bandwidth left by CBR and VBR services, which is ideal for data applications and can perform well for real-time applications with the appropriate implementation. …”
Get full text
Get full text
Thesis -
3
Optimized crossover genetic algorithm for vehicle routing problem with time windows
Published 2010“…Problem statement: In this study, we considered the application of a genetic algorithm to vehicle routing problem with time windows where a set of vehicles with limits on capacity and travel time are available to service a set of customers with demands and earliest and latest time for serving. …”
Get full text
Get full text
Get full text
Article -
4
Formulating and solving stochastic truck and trailer routing problems using meta-heuristic algorithms / Seyedmehdi Mirmohammadsadeghi
Published 2015“…Since special operational restrictions or requirements may exist in some real applications such as customer‘s working period that some customers must be serviced during a specified time interval and there can be no delays in servicing those customers. …”
Get full text
Get full text
Get full text
Thesis -
5
Dynamic replication algorithm in data grid: Survey
Published 2008Get full text
Get full text
Get full text
Book Section -
6
Mobile technology generations and cryptographic algorithms: analysis study
Published 2016“…This paper provides analysis study of Mobile generations (From Mobile 1G to Mobile 4G) and cryptographic algorithms used in these generations. The study based on some factors like features, services, standards, and techniques which have adopted in these generations.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Virtual Force Algorithm and Cuckoo Search algorithm for node placement technique in wireless sensor network
Published 2013“…Wireless Sensor Network (WSN) has become one of the current technologies in the world of information technology.Coverage and connectivity are the main requirement that reflects the performance and quality of services in WSN applications.In WSN applications with a large scale area, the sensor nodes are deployed randomly in a noninvasive way.The deployment process will cause some issues such as coverage hole and overlapping that reflect to the performance of coverage area and connectivity.Node placement model is constructed to find the optimal node placement.Virtual Force Algorithm (VFA) and Cuckoo Search (CS) algorithm approach for node placement technique is analyzed to find the optimal node placement in order to improve the network coverage and connectivity with a minimum coverage hole and overlapping area.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
-
10
Multi agent quality of service routing based on scheme ant colony optimization algorithm
Published 2014“…The current Internet needs to support a wide variety of applications with different demands in terms of Quality of Service (QoS) requirements including constraints on throughput, delay, jitter, loss rate. …”
Get full text
Get full text
Thesis -
11
Map navigation for mobile tourist / Rohana Abd Jalil
Published 2007“…Recent years have seen rapid growth in the area of map-based mobile application system for tourist information services. …”
Get full text
Get full text
Thesis -
12
Hybrid metaheuristics for QOS-aware service composition / Hadi Naghavipour
Published 2022“…With the advent of Service-Oriented Architecture (SOA), services can be registered, invoked, and combined by their identical Quality of Services (QoS) attributes to create a new value-added application that fulfils user requirements. …”
Get full text
Get full text
Get full text
Thesis -
13
A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network
Published 2023“…Machine Learning (ML) is seen as a promising application that offers autonomous learning and provides optimized solutions to complex problems. …”
text::Thesis -
14
A Comparative Study on Compression of Different Image File Formats
Published 1999Get full text
Get full text
Thesis -
15
-
16
Rapid Penang travel planner mobile application using GPS positioning and decision-making algorithm / Naslyiana Abdul Latif
Published 2015“…On the other hand, there are minor respondents that do not agreed with this application. This is because they only used the bus services in a few times and for the same destination every day. …”
Get full text
Get full text
Thesis -
17
-
18
An artificial immune system model as talent performance predictor / Siti ‘Aisyah Sa’dan, Hamidah Jantan and Mohd Hanapi Abdul Latif
Published 2016“…The objective of this study is to propose a prediction model based on bio-inspired algorithm for talent knowledge discovery through some experiments. …”
Get full text
Get full text
Research Reports -
19
Simulation algorithm of bayesian approach for choice-conjoint model
Published 2011Get full text
Thesis -
20
Enhancing Solutions Of Capacity Vehicle Routing Problem Based On An Improvement Ant Colony System Algorithm
Published 2019“…Several authors over the last only some decades have recognized many types of research and used several algorithms with various methods to solve it. …”
Get full text
Get full text
Get full text
Article
