Search Results - (( _ constructive max algorithm ) OR ( java application during algorithm ))
Search alternatives:
- application during »
- constructive max »
- java application »
- during algorithm »
- max algorithm »
-
1
Two-dimensional burst construction with QoS assurance for OFDMA mobile WiMAX system
Published 2014Get full text
Get full text
Conference or Workshop Item -
2
Cross-layer design using multi-channel system in WiMAX mesh networks
Published 2008“…This paper proposes a centralized scheduling algorithm that can reduce interferences by constructing routing tree with multi-channel single transceiver system in WiMAX mesh networks. …”
Get full text
Get full text
Conference or Workshop Item -
3
Constructing routing tree for centralized scheduling using multi-channel single transceiver system in 802.16 mesh mode
Published 2008“…This paper proposes a centralized scheduling algorithm that can reduce interferences by constructing routing tree with multi-channel single transceiver system in WiMAX mesh networks. …”
Get full text
Get full text
Conference or Workshop Item -
4
Constructing routing tree centralized scheduling using multi-channel system in 802.16
Published 2008“…This paper proposes a centralized scheduling algorithm by constructing routing tree in WiMax mesh network, which introduces the cross-layer concept between the media access controller (MAC) and the network layers. …”
Get full text
Get full text
Conference or Workshop Item -
5
A comparative performance analysis of computational intelligence techniques to solve the asymmetric travelling salesman problem
Published 2021“…This paper presents a comparative performance analysis of some metaheuristics such as the African Buffalo Optimization algorithm (ABO), Improved Extremal Optimization (IEO), Model-Induced Max-Min Ant Colony Optimization (MIMM-ACO), Max-Min Ant System (MMAS), Cooperative Genetic Ant System (CGAS), and the heuristic, Randomized Insertion Algorithm (RAI) to solve the asymmetric Travelling Salesman Problem (ATSP). …”
Get full text
Get full text
Get full text
Article -
6
Improvement of Centralized Routing and Scheduling Using Cross-Layer Design and Multi-Slot Assignment in Wimax Mesh Networks
Published 2009“…This thesis also proposes a centralized scheduling algorithm that can avoid the collision by constructing routing path with multi-slot single transceiver system for WiMAX mesh networks. …”
Get full text
Get full text
Thesis -
7
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
8
Enhancement Of Wifi Indoor Positioning System
Published 2011“…The estimated location is checked wether it is inside the bounding box constructed by the Min-Max algorithm, if so, a Kalman filter is applied which in turn fixes the distance that falls under non-line-of-sight condition (that caused the error), and after that, the estimated location is recalculated with the corrected distances using LSA. …”
Get full text
Get full text
Thesis -
9
CPLD based controller for single phase inverters
Published 2007“…A design and implementation of PWM by using complex programmable logic device (CPLD) from Altera MaxPlus II is constructed and programmed. The involved software, hardware, and suitable algorithm to implement and generate the PWM are developed in details. …”
Get full text
Get full text
Thesis -
10
CPLD based controller for single phase inverters
Published 2007“…A design and implementation of PWM by using complex programmable logic device (CPLD) from Altera MaxPlus II is constructed and programmed. The involved software, hardware, and suitable algorithm to implement and generate the PWM are developed in details. …”
Get full text
Get full text
Thesis -
11
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
12
-
13
Cross layer design in 802.16d
Published 2009“…WiMAX based wireless mesh network aims to provide broadband wireless for the last-mile access. …”
Get full text
Get full text
Get full text
Article -
14
Interference avoidance routing and scheduling using multiple transceivers for IEEE 802.16 mesh network
Published 2010“…Here, a routing tree is constructed based on the energy/bit minimization routing (EbMR). …”
Get full text
Get full text
Thesis -
15
-
16
-
17
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
18
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis -
19
Face anti-spoofing using Convolutional Neural Networks / Siti Nurul Izzah Bahrain
Published 2024“…The model facilitated a straightforward construction of the CNN, allowing for sequential handling of inputs. …”
Get full text
Get full text
Thesis -
20
