Search Results - (( tender evaluation methods algorithm ) OR ( rate information services algorithm ))*
Search alternatives:
- information services »
- evaluation methods »
- tender evaluation »
- methods algorithm »
- rate information »
-
1
Development of Fuzzy Multi-Criteria Analysis Method for Tender Cleaning Service Selection
Published 2017“…The model is solved using algorithms which integrates the decision maker’s decision for assessments on criteria weight with the performance ratings. …”
Get full text
Get full text
Final Year Project -
2
Robust scheduling algorithm for guaranteed bit rate services
Published 2013“…This paper proposes a novel packet scheduling algorithm to overcome detrimental effects of channel impairments on the quality of service of delay-sensitive Guaranteed Bit Rate (GBR) services. …”
Get full text
Get full text
Get full text
Article -
3
-
4
Adaptive resource allocation algorithms with QoS support in OFDMA-based WiMAX networks
Published 2014“…In Worldwide Interoperability for Microwave Access (WiMAX) the primary concern is Quality of Service (QoS) support which aims to satisfy the diverse service requirements and to guarantee higher data rates allocation for different service classes. …”
Get full text
Get full text
Thesis -
5
A robust GA-based QoS routing algorithm for solving multi-constrained path problem
Published 2023“…This makes the algorithm more robust in the case that the rate of change of state information in the network is higher than the rate of state information received by the router. …”
Article -
6
Load and service adaptive algorithm (LSAA) for tight coupling based integration architecture
Published 2014“…This research work introduces the Load and Service Adaptive Algorithm (LSAA) for the integrated UMTS/WLAN. …”
Get full text
Get full text
Conference or Workshop Item -
7
Maximum rate resource allocation algorithms with multiuser diversity and QoS support for downlink OFDMA based WiMAX system
Published 2016“…Both approaches allocate appropriate resources and provide higher data rates for different service types by employing a weighted-rate factor and feedback information delay which are made to be greater than the minimum QoS requirements. …”
Get full text
Get full text
Get full text
Article -
8
Mitigating Slow Hypertext Transfer Protocol Distributed Denial of Service Attacks in Software Defined Networks
Published 2021“…Distributed Denial of Service (DDoS) attacks has been one of the persistent forms of attacks on information technology infrastructure connected to public networks due to the ease of access to DDoS attack tools. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
A semi greedy soft real-time multiprocessor scheduling algorithm
Published 2014Get full text
Get full text
Conference or Workshop Item -
10
Quality-driven scheduling for long-term evolution system
Published 2011“…This paper proposes a novel packet scheduling algorithm that extends Opportunistic and Delay Sensitive (ODS) algorithm to simultaneously support Guaranteed Bit Rate (GBR) and Non-GBR (NGBR) services over downlink Long Term Evolution (LTE) system. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
11
Intelligent Multi-cellular Network Connectivity for Internet of Things Applications
Published 2023Conference Paper -
12
-
13
-
14
Comparison on queuing performance measures on customer’s flow using Queuing Theory Model and DSW Algorithm / Muhammad Izuanudin Azmi, Muhamad Aiman Zulhaikal Azizul and Nurul Aisya...
Published 2022“…The values of arrival rate, and service rate, µ is obtained from the data collected from the system at the LHDN service counters and will afterward be used to calculate the variables in the Queuing Theory Model and Fuzzy Queuing Model. …”
Get full text
Get full text
Student Project -
15
A scheduling algorithm for WDM optical networks
Published 2001Get full text
Get full text
Get full text
Article -
16
Enhanced privacy protection from location dependent attacks in location based services using spatial cloaking
Published 2020“…The experimental results showed that the proposed cloaking algorithm outperformed existing algorithms such as IClique, OptClique and MMBClique in terms of its cloaking success rate and processing time.…”
Get full text
Get full text
Get full text
Article -
17
Enhanced Privacy Protection Against Location-Dependent Attacks in Location Based Services Using Spatial Cloaking
Published 2020“…The experimental results showed that the proposed cloaking algorithm out performed existing algorithms such as IClique, OptClique and MMBClique in terms of its cloaking success rate and processing time.…”
Get full text
Get full text
Article -
18
Performance evaluation of task scheduling using hybrid meta-heuristic in the heterogeneous cloud environment
Published 2019“…Cloud computing is a platform in which it provides services, information and software over the Internet. …”
Get full text
Get full text
Thesis -
19
-
20
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis
