Search Results - (( based coding drops algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- java application »
- based coding »
- drops »
-
1
Experimental implementation controlled SPWM inverter based harmony search algorithm
Published 2023Article -
2
Development of a scalable video compression algorithm
Published 2012“…The result shows that the managed complexity algorithm based on Lagrangian Multiplier function outperforms the normal encoder. …”
Get full text
Get full text
Get full text
Proceeding Paper -
3
Experimental implementation controlled SPWM inverter based harmony search algorithm
Published 2017“…Based on the output results, the proposed voltage controller using HS algorithm based PI (HS-PI) showed that the inverter output performance is improved in terms of voltage amplitude, robustness, and convergence rate speed as compared to PSO algorithm based PI (PSO-PI). …”
Get full text
Get full text
Get full text
Article -
4
Network Traffic Classification Analysis on Differentiated Services Code Point Using Deep Learning Models for Efficient Deep Packet Inspection
Published 2024“…Most of the algorithms got promising results and classify packets based on DSCP accurately. …”
Get full text
Get full text
Get full text
Article -
5
Performance enhancement of adaptive cluster formation and routing protocols in wireless networks
Published 2017“…The IVRP, EBCRA and ESRSBRP performance have been compared with the other routing algorithms. The efficiency and scalability of the proposed algorithms are measured based on different performance metrics, namely: throughput, packet delivery ratio, end to end delay, the number of dropped packets and normalized control overhead. …”
Get full text
Get full text
Get full text
Thesis -
6
Fractal coding of bio-metric image for face authentication
Published 2021“…This thesis implements the algorithms for the Methods of CPM, BPBM fractal coding, and its application. …”
Get full text
Get full text
Thesis -
7
-
8
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
9
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Energy-efficient medium access control strategy for cooperative wireless networks
Published 2016“…In EAP-CMAC, the best transmission mode is selected among direct transmission, traditional cooperation and PNC-based transmission by considering the destination queue and source-destination link quality.Moreover, a joint relay selection and power allocation algorithm is proposed based on location information and the nodes residual energy that significantly improves the network lifetime and energy saving in wireless networks. …”
Get full text
Get full text
Thesis
