Search Results - (( tender evaluation methods algorithm ) OR ( rate information services algorithm ))*

Refine Results
  1. 1

    Development of Fuzzy Multi-Criteria Analysis Method for Tender Cleaning Service Selection by Aminudin, Nurul Bazlaa’

    Published 2017
    “…The model is solved using algorithms which integrates the decision maker’s decision for assessments on criteria weight with the performance ratings. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Robust scheduling algorithm for guaranteed bit rate services by Mohd. Ramli, Huda Adibah, Sandrasegaran, Kumbesan

    Published 2013
    “…This paper proposes a novel packet scheduling algorithm to overcome detrimental effects of channel impairments on the quality of service of delay-sensitive Guaranteed Bit Rate (GBR) services. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Adaptive resource allocation algorithms with QoS support in OFDMA-based WiMAX networks by Alsahag, Ali Mohamemed Mansor

    Published 2014
    “…In Worldwide Interoperability for Microwave Access (WiMAX) the primary concern is Quality of Service (QoS) support which aims to satisfy the diverse service requirements and to guarantee higher data rates allocation for different service classes. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A robust GA-based QoS routing algorithm for solving multi-constrained path problem by Yussof S., See O.H.

    Published 2023
    “…This makes the algorithm more robust in the case that the rate of change of state information in the network is higher than the rate of state information received by the router. …”
    Article
  6. 6

    Load and service adaptive algorithm (LSAA) for tight coupling based integration architecture by Aziz, A., Saad, N.M.

    Published 2014
    “…This research work introduces the Load and Service Adaptive Algorithm (LSAA) for the integrated UMTS/WLAN. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Maximum rate resource allocation algorithms with multiuser diversity and QoS support for downlink OFDMA based WiMAX system by Alsahag, Ali Mohammed, Mohd. Ali, Borhanuddin, Noordin, Nor Kamariah, Mohamad, Hafizal

    Published 2016
    “…Both approaches allocate appropriate resources and provide higher data rates for different service types by employing a weighted-rate factor and feedback information delay which are made to be greater than the minimum QoS requirements. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Mitigating Slow Hypertext Transfer Protocol Distributed Denial of Service Attacks in Software Defined Networks by Akanji, Oluwatobi Shadrach, Abisoye, Opeyemi Aderiike, Iliyasu, Mohammed Awwal

    Published 2021
    “…Distributed Denial of Service (DDoS) attacks has been one of the persistent forms of attacks on information technology infrastructure connected to public networks due to the ease of access to DDoS attack tools. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Quality-driven scheduling for long-term evolution system by Mohd. Ramli, Huda Adibah, Sandrasegaran, Kumbesan, Patachaianand, Rachod

    Published 2011
    “…This paper proposes a novel packet scheduling algorithm that extends Opportunistic and Delay Sensitive (ODS) algorithm to simultaneously support Guaranteed Bit Rate (GBR) and Non-GBR (NGBR) services over downlink Long Term Evolution (LTE) system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12
  13. 13
  14. 14

    Comparison on queuing performance measures on customer’s flow using Queuing Theory Model and DSW Algorithm / Muhammad Izuanudin Azmi, Muhamad Aiman Zulhaikal Azizul and Nurul Aisya... by Azmi, Muhammad Izuanudin, Azizul, Muhamad Aiman Zulhaikal, Abd Razak, Nurul Aisyah

    Published 2022
    “…The values of arrival rate, and service rate, µ is obtained from the data collected from the system at the LHDN service counters and will afterward be used to calculate the variables in the Queuing Theory Model and Fuzzy Queuing Model. …”
    Get full text
    Get full text
    Student Project
  15. 15
  16. 16

    Enhanced privacy protection from location dependent attacks in location based services using spatial cloaking by Saravanan, Perumal Shanthi, Balasundaram, Sadhu Ramakrishnan

    Published 2020
    “…The experimental results showed that the proposed cloaking algorithm outperformed existing algorithms such as IClique, OptClique and MMBClique in terms of its cloaking success rate and processing time.…”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Enhanced Privacy Protection Against Location-Dependent Attacks in Location Based Services Using Spatial Cloaking by Saravanan, Perumal Shanthi, Balasundaram, Sadhu Ramakrishnan

    Published 2020
    “…The experimental results showed that the proposed cloaking algorithm out performed existing algorithms such as IClique, OptClique and MMBClique in terms of its cloaking success rate and processing time.…”
    Get full text
    Get full text
    Article
  18. 18

    Performance evaluation of task scheduling using hybrid meta-heuristic in the heterogeneous cloud environment by Mohammed, Faten Ameen Saif

    Published 2019
    “…Cloud computing is a platform in which it provides services, information and software over the Internet. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20