Search Results - (( affecting implementation perspective algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- affecting implementation »
- implication based »
- java implication »
-
1
-
2
Traffic management algorithms for LEO satellite networks
Published 2016“…Overall, from all the three experiments that have been conducted, the proposed routing algorithms which have been developed to manage the network traffic have proved better than the previously developed algorithms in several perspectives especially for the implementation of real-time applications in LEO satellite networks.…”
Get full text
Get full text
Get full text
Thesis -
3
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
4
-
5
A simulation tool to evaluate the usability of agent centric Resource-Event-Agent (REA) database modeling methodology: The development of revenue cycle in accounting information sy...
Published 2023“…The author has implemented quantitative analysis by generating mathematical algorithms to compare efficiency between conventional and Agent Centric REA Modeling. …”
Conference paper -
6
The quadriceps muscle of knee joint modelling using neural network approach: Part 2
Published 2017“…Subsequently, this paper displays the change of quadriceps muscle model by using fake savvy strategy named backpropagation neural system nonlinear autoregressive (BPNN-NAR) model in perspective of utilitarian electrical affectation (FES). …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
Covariance matrix analysis in simultaneous localization and mapping
Published 2016“…Sudden absence of these data might affect the state estimation and the covariance value. …”
Get full text
Get full text
Thesis -
8
Determining penetration limit of central distributed generation topology in radial distribution networks
Published 2021“…In addition, the applied distributed generation topology directly affects the network penetration limit, which influence network operational limits consequently. …”
Get full text
Get full text
Thesis
