Search Results - (( developing service context algorithm ) OR ( java evolution optimization algorithm ))
Search alternatives:
- evolution optimization »
- developing service »
- context algorithm »
- java »
-
1
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…The aim of this evolution is to reflect the unseen time overhead incurred by optimal real-time algorithm, represented by LRE-TL, which might hinder the claimed optimality of such algorithms when they are practically implemented. …”
Get full text
Get full text
Conference or Workshop Item -
2
Enhanced privacy protection from location dependent attacks in location based services using spatial cloaking
Published 2020“…Use of Internet enabled mobile devices has facilitated the rapid development of location-based services (LBS). LBS allow users to access useful information such as the nearest ATM, temple, and so on. …”
Get full text
Get full text
Get full text
Article -
3
Enhanced Privacy Protection Against Location-Dependent Attacks in Location Based Services Using Spatial Cloaking
Published 2020“…Most of the existing location cloaking algorithms are only concerned with snapshot user locations and cannot effectively prevent users from location-dependent attacks when user location-contexts are continuously updated. …”
Get full text
Get full text
Article -
4
-
5
CONTEXT AWARE TRAFFIC SCHEDULING ALGORITHM FOR COMMUNICATION SYSTEM IN POWER DISTRIBUTION NETWORK
Published 2023“…In order to verify the advantages of the proposed algorithm, it is compared with simulation results without contextual aware algorithm. …”
text::Thesis -
6
Pet hero pet care services mobile application recommendation system using content-based filtering / Farah ‘Aliya Jasmin
Published 2023“…Therefore, the introduction of the Pet Hero Pet Care Services Mobile Application using Content-Based Filtering techniques with TF-IDF algorithm can help overcome these challenges. …”
Get full text
Get full text
Thesis -
7
CYCLOSTATIONARY FEATURES OF PAL TV AND WIRELESS MICROPHONE FOR COGNITIVE RADIO APPLICATIONS
Published 2010“…In order to do so, we develop the co-existence scenario with three cases according to geographical positions of primary services and secondary service. …”
Get full text
Get full text
Thesis -
8
Risk Concentration for Context Assessment (RiCCA) of SMS Messages using Danger Theory
Published 2024“…Consolidation of this theory with other procedures such as risk assessment and text mining has produced a model namely as Risk Concentration for Context Assessment or RiCCA. This RiCCA prototype is developed from Danger Theory algorithms that is Dendritic Cell Algorithm (DCA) and Deterministic Dendritic Cell Algorithm (dDCA). …”
thesis::doctoral thesis -
9
An immunological-based simulation: A case study of risk concentration for mobile spam context assessment
Published 2024Get full text
Get full text
journal::journal article -
10
Joint optimization of resources allocation for quality of service aware next-generation heterogeneous cellular networks / Hayder Faeq Rasool Alhashimi
Published 2025“…The research seeks to identify key challenges with the goal of developing effective approaches in 6G HetNets. In this context, resource management aspects such as user association, spectrum allocation, and power allocation are studied. …”
Get full text
Get full text
Get full text
Thesis -
11
Priority based job scheduling technique that utilizes gaps to increase the efficiency of job distribution in cloud computing
Published 2024“…After that, we developed a priority-based fair scheduling (PBFS) algorithm to schedule jobs so that they have access to the required resources at optimal times. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
-
13
Adaptive resource allocation for reliable performance in heterogeneous distributed systems.
Published 2013Get full text
Book Section -
14
Withstanding the effect of Industry 4.0: the role of high performance work system and management philosophy
Published 2020“…Coping with challenges posed by the extant IR 4.0 demands that small businesses should provide ‘added-value’ services, and products, or high quality and innovative products and services which could be possible through strategic development of employees. …”
Get full text
Get full text
Get full text
Article -
15
Evaluation approach for efficient countermeasure techniques against denial-of-service attack on MPSoC-based IoT using multi-criteria decision-making
Published 2022“…Context: Denial-of-Service Attack countermeasure techniques (DoS A-CTs) evaluation is a Multi-criteria decision-making (MCDM) problem based on different MPSoCs of IoT platform design, performance, and design overhead. …”
Get full text
Get full text
Article -
16
Optimizing Cloud Storage Costs: Introducing the Pre-Evaluation-Based Cost Optimization (PECSCO) Mechanism
Published 2025“…The proposed algorithm aimed at reducing cloud storage cost by strategically determining the best locations for evaluators within a network of nodes for efficient monitoring, particularly in surveillance contexts indicated by the mention of CCTVs. …”
Conference paper -
17
-
18
Multi-dimensional networking and distributed computing services
Published 2012“…The multi-dimensional research issues include wireless and mobility problems, routing protocols and algorithms, resource and service location protocols, performance evaluations of networking systems, ubiquitous systems, context aware ubiquitous environment, mechanisms to improve throughput over wireless links, network management and network security, and other related areas. …”
Get full text
Get full text
Get full text
Article -
19
Analyzing customer reviews for ARBA Travel using sentiment analysis
Published 2025“…Among these, Naive Bayes achieved the highest performance with an accuracy of 93.67% and an F1-score of 93.54%, making it the most effective model for sentiment classification in this context. The results were visualized using an interactive dashboard developed in Power BI, allowing users to explore sentiment trends, keyword frequency, and review distributions by gender, platform, and time. …”
Get full text
Get full text
Student Project -
20
Fakebuster: fake news detection system using logistic regression technique in machine learning
Published 2019“…Fake news can be certainly solved by the aid of artificial intelligence which includes machine learning algorithms. The objective of this project is to propose a fake news detection model using Logistic Regression, to evaluate the performance of Logistic Regression as fake news detection model and to develop a web application that allows entry of a news content or news URL. …”
Get full text
Get full text
Article
