Search Results - (( based constructive max algorithm ) OR ( java application matching algorithm ))
Search alternatives:
- application matching »
- based constructive »
- constructive max »
- java application »
- max algorithm »
-
1
-
2
Cross-layer design using multi-channel system in WiMAX mesh networks
Published 2008“…This paper proposes a centralized scheduling algorithm that can reduce interferences by constructing routing tree with multi-channel single transceiver system in WiMAX mesh networks. …”
Get full text
Get full text
Conference or Workshop Item -
3
Constructing routing tree for centralized scheduling using multi-channel single transceiver system in 802.16 mesh mode
Published 2008“…This paper proposes a centralized scheduling algorithm that can reduce interferences by constructing routing tree with multi-channel single transceiver system in WiMAX mesh networks. …”
Get full text
Get full text
Conference or Workshop Item -
4
Improvement of Centralized Routing and Scheduling Using Cross-Layer Design and Multi-Slot Assignment in Wimax Mesh Networks
Published 2009“…This thesis also proposes a centralized scheduling algorithm that can avoid the collision by constructing routing path with multi-slot single transceiver system for WiMAX mesh networks. …”
Get full text
Get full text
Thesis -
5
Constructing routing tree centralized scheduling using multi-channel system in 802.16
Published 2008“…This paper proposes a centralized scheduling algorithm by constructing routing tree in WiMax mesh network, which introduces the cross-layer concept between the media access controller (MAC) and the network layers. …”
Get full text
Get full text
Conference or Workshop Item -
6
Enhancement Of Wifi Indoor Positioning System
Published 2011“…In this research, a new algorithm named (WBI) is proposed, based on the WiFi Received Signal Strength (RSS) technology. …”
Get full text
Get full text
Thesis -
7
-
8
-
9
-
10
-
11
Message based random variable length key encryption algorithm.
Published 2009Get full text
Get full text
Article -
12
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Interference avoidance routing and scheduling using multiple transceivers for IEEE 802.16 mesh network
Published 2010“…Here, a routing tree is constructed based on the energy/bit minimization routing (EbMR). …”
Get full text
Get full text
Thesis -
14
Cross layer design in 802.16d
Published 2009“…WiMAX based wireless mesh network aims to provide broadband wireless for the last-mile access. …”
Get full text
Get full text
Get full text
Article -
15
-
16
Optimization of hydropower reservoir system using genetic algorithm for various climatic scenarios
Published 2015“…In order to estimate daily evapotranspiration, daily observed Min and Max temperature was used in the estimation based on Hargreaves-Samani equation. …”
Get full text
Get full text
Get full text
Thesis -
17
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…The main algorithms used are profile determination and user similarity. …”
Get full text
Get full text
Thesis -
18
Autonomous path planning through application of rotated two-parameter overrelaxation 9-point Laplacian iteration technique
Published 2020“…This iteration technique is a harmonic function that solves the Laplace’s equation where the modelling of the environment is based on. The harmonic functions are an appropriate method to be used on autonomous path planning because it satisfies the min-max principle, therefore avoiding the occurrence of local minima which traps robot’s movements, and that it offers complete path planning algorithm. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article
