Search Results - (( code classification mining algorithm ) OR ( evolution communication system algorithm ))
Search alternatives:
- evolution communication »
- classification mining »
- code classification »
- mining algorithm »
- system algorithm »
-
1
Evaluations of oil palm fresh fruit bunches maturity degree using multiband spectrometer
Published 2017“…Furthermore, the Lazy-IBK algorithm have been validated to produce the best classifier model, with the machine learning algorithm performance of 65.26%, recall of 65.3%, and 65.4% F-measured as compared to other evaluated machine learning classifier algorithms proposed within the WEKA data mining algorithm. …”
Get full text
Get full text
Get full text
Thesis -
2
Comparative analysis for topic classification in juz Al-Baqarah
Published 2018“…The SVM performance is then compared against other classification algorithms such as Naive Bayes, J48 Decision Tree and K-Nearest Neighbours. …”
Get full text
Get full text
Article -
3
-
4
Efficient radio resource management algorithms for downlink long term evolution networks
Published 2018“…Hence, the major problem is developing a scheduling algorithm which creates a trade-off between the system performances. …”
Get full text
Get full text
Thesis -
5
Load balancing in 4G long term evolution / Marvin Hendary
Published 2013“…Long Term Evolution (LTE) and LTE-Advanced is the next major step towards 4th generation of mobile communications. …”
Get full text
Get full text
Thesis -
6
Dynamic smart grid communication parameters based cognitive radio network
Published 2023“…A differential evolution algorithm is used to select the optimal transmission parameters for given communication modes based on a fitness function that combines multiple objectives based on appropriate weights. …”
Article -
7
-
8
Classification of metamorphic virus using n-grams signatures
Published 2020Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Differential evolution based special protection and control scheme for contingency monitoring of transmission line overloading
Published 2017Get full text
Get full text
Conference or Workshop Item -
10
-
11
An improved component carrier selection algorithm for downlink long term evolution advanced
Published 2014Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
Learner’s emotion prediction using production rules classification algorithm through brain computer interface tool
Published 2018“…No EEG studies in Malaysia has been done on school children to study their emotional behaviour while learning. Classification and prediction are the functions provided by the data mining techniques that suit in EEG signal processing. …”
Get full text
Get full text
Thesis -
13
An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection
Published 2018“…The V-Detectors algorithm depends greatly on the random detectors generated in monitoring the status of a system. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
-
15
CONTEXT AWARE TRAFFIC SCHEDULING ALGORITHM FOR COMMUNICATION SYSTEM IN POWER DISTRIBUTION NETWORK
Published 2023“…Smart grid is an evolution from conventional power grid in which power communication system has migrated from one-way to bi-directional communication network. …”
text::Thesis -
16
Channel-aware downlink scheduling for quality of service in long term evolution network
Published 2018“…The proposed algorithm using system-level simulation experiments with performance comparison with DBWPF in terms of end-to-end delay, fairness, system throughput, Packet Loss Ratio (PLR), and spectral efficiency was evaluated. …”
Get full text
Get full text
Get full text
Thesis -
17
A modified group authentication scheme for machine type communication in LTE/LTE-a networks
Published 2018“…Meeting the necessities of control usage of devices and mass implement transmission is a key issue in the implementation of MTC in the Long Term Evolution/Long Term Evolution Advanced systems. Likewise, an authentication scheme is the most important piece of the system as MTC is one of the procedures that suffers under group authorization requests. …”
Get full text
Get full text
Thesis -
18
On fractional and semi-soft handover in long term evolution(LTE) networks
Published 2011Get full text
Get full text
Conference or Workshop Item -
19
Performance analyses of adaptive handover decision algorithm using spectrum aggregation in long term evolution - advanced network
Published 2021“…The ever increasing demand for wireless broadband services has imposed severe bandwidth constraints on wireless communication system. These demands have led to the technological responses such as the advancement in radio access, coding and modulation schemes as well as spectrum(carrier) aggregation and cognitive radio capabilities of Long Term Evolution - Advanced (LTE-A) and Fifth Generation (5G) networks developed by the Third Generation Partnership Project (3GPP). …”
Get full text
Get full text
Conference or Workshop Item -
20
