Search Results - (( developing mobile evolution algorithm ) OR ( java implementation some algorithm ))
Search alternatives:
- evolution algorithm »
- java implementation »
- implementation some »
- mobile evolution »
- some algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff
Published 2018“…The energy consumption of cellular networks worldwide has become a major obstacle to the continued future development of mobile data services, considering that the number of mobile phone users worldwide has already surpassed 4 billion and as the near exponential increase of data traffic carried over mobile networks continues, mobile network operators are faced with rapidly increasing energy costs and regulatory pressures to reduce their carbon footprint to operate more “green” networks. …”
Get full text
Get full text
Book Section -
4
-
5
Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff
Published 2017“…The energy consumption of cellular networks worldwide has become a major obstacle to the continued future development of mobile data services, considering that the number of mobile phone users worldwide has already surpassed 4 billion and as the near exponential increase of data traffic carried over mobile networks continues, mobile network operators are faced with rapidly increasing energy costs and regulatory pressures to reduce their carbon footprint to operate more "green" networks. …”
Get full text
Get full text
Thesis -
6
Cloudlet deployment and task offloading in mobile edge computing using variable-length whale and differential evolution optimization and analytical hierarchical process for decisio...
Published 2023“…Mobile edge computing (MEC) is a well-known technique to support delay-sensitive applications at the edge of mobile networks. …”
Get full text
Get full text
Thesis -
7
A study of packet scheduling with mobile cellular channel impairments
Published 2012“…This paper studies a number of low complexity real time packet scheduling algorithms developed for the legacy mobile cellular systems. …”
Get full text
Get full text
Get full text
Proceeding Paper -
8
-
9
Enhanced handover mechanism in long term evolution (LTE) networks
Published 2011“…The strengths and weaknesses for each algorithm are discussed, and conclusions are subsequently made.…”
Get full text
Get full text
Get full text
Article -
10
Efficient radio resource management algorithms for downlink long term evolution networks
Published 2018“…Hence, the major problem is developing a scheduling algorithm which creates a trade-off between the system performances. …”
Get full text
Get full text
Thesis -
11
A study of packet scheduling with mobile cellular channel impairments
Published 2012“…This paper studies a number of low complexity real time packet scheduling algorithms developed for the legacy mobile cellular systems. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
Design, optimization and fabrication of a climbing six articulated-wheeled robot using artificial evolution and 3D printing
Published 2015“…Over the last decade, various mobile robots have been developed and widely used in myriad sectors. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
14
-
15
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
16
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
17
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
18
A robotwall simulator
Published 2005“…This report is written to study the Genetic Algorithm (GA) that applies to the development of mobile robot wall-following behaviors. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
19
-
20
A centralized localization algorithm for prolonging the lifetime of wireless sensor networks using particle swarm optimization in the existence of obstacles
Published 2017“…The evolution in micro-electro-mechanical systems technology (MEMS) has triggered the need for the development of wireless sensor network (WSN). …”
Get full text
Get full text
Get full text
Get full text
Thesis
