Search Results - (( developing formative theory algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- developing formative »
- implication based »
- formative theory »
- theory algorithm »
- java implication »
-
1
-
2
Coalition formation for throughput enhancement via one-sided matching theory
Published 2016“…In the proposed model, we make use of one-sided matching theory to develop an algorithm for the cognitive radios to form coalitions of varying the size to improve their individual gains (.e.g. throughput and the probability of false alarm). …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
3
Coalition formation for throughput enhancement via one-sided matching theory
Published 2016“…In the proposed model, we make use of one-sided matching theory to develop an algorithm for the cognitive radios to form coalitions of varying the size to improve their individual gains (.e.g. throughput and the probability of false alarm). …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
Throughput enhancement in cognitive radio network via coalition formation using matching theory
Published 2015“…Index Terms—cognitive radio; spectrum sensing; distributed algorithms; stable matching, matching theory.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
5
Agreement options for negotiation on material location decision of housing development
Published 2020“…Decision algorithms are based on the cooperative game theory to develop the agreement options and coalition formation. …”
Get full text
Get full text
Article -
6
Enhanced Instantaneous Power Theory with average algorithm for indirect current controlled three-level inverter-based shunt active power filter under dynamic state conditions
Published 2016“…The proposed algorithm is developed and evaluated in MATLAB/Simulink. …”
Get full text
Get full text
Get full text
Article -
7
A New Cell Formation Method Considering Operation Sequences And Production Volumes
Published 2013“…The graph theory was employed to develop the algorithm. It consists of four stages that the first one shows the sequences of machines that are used by each part in a graph. …”
Get full text
Get full text
Thesis -
8
-
9
The use of the Bayesian approach in the formation of the student's competence in the ICT direction
Published 2019“…The paper gives a small introduction about the competence of students and explores the possibility of using Bayesian networks in the formation of the competence of an IT trainer. Developed an integrated algorithm for the formation of the competence of training in the direction of IT.…”
Get full text
Get full text
Conference or Workshop Item -
10
Risk Concentration for Context Assessment (RiCCA) of SMS Messages using Danger Theory
Published 2024“…This RiCCA prototype is developed from Danger Theory algorithms that is Dendritic Cell Algorithm (DCA) and Deterministic Dendritic Cell Algorithm (dDCA). …”
thesis::doctoral thesis -
11
Extreme air pollutant data analysis using classical and Bayesian approaches
Published 2015“…MTM algorithm is an extension of MH algorithm, designed to improve the convergence of MH algorithm by performing parallel computation. …”
Get full text
Get full text
Thesis -
12
Text normalization algorithm for facebook chats in Hausa language
Published 2014Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
An immunological-based simulation: A case study of risk concentration for mobile spam context assessment
Published 2024Get full text
Get full text
journal::journal article -
14
A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat
Published 2021“…Size was extracted using Extreme Point Detection algorithm and Hit or Miss Transformation method was used to extract the stroke formation pattern. …”
Get full text
Get full text
Thesis -
15
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
16
-
17
-
18
Tracking of dynamic arm motion estimation and interaction with fuzzy control
Published 2016“…Utilizing a virtual three-dimensional interactive rectan- gular parallelepiped, we establish correspondence be- tween the virtual scene and the users arm position in- formation. For robustly tracking the users arm position, an arm motion estimation method is designed based on the fuzzy predictive control fuzzy Mamdani algorithm theory. …”
Get full text
Get full text
Article -
19
Trade-off between energy efficiency and collisions for MAC protocols of wireless sensor network
Published 2015“…In CGT-MAC, after geographically grouped into clusters, all SNs within a cluster based on current traffic conditions select a proper backoff period using the game theory for data transmission. Simulation models have been developed and simulated to verify the performance improvements of the proposed algorithms. …”
Get full text
Get full text
Thesis -
20
