Search Results - (( developing solution max algorithm ) OR ( java application during algorithm ))
Search alternatives:
- developing solution »
- application during »
- java application »
- during algorithm »
- max algorithm »
- solution max »
-
1
Simulation model to improve QoS performance over fixed WiMAX using OPNET
Published 2013“…A Model was developed based on the proposed new distributed model (Master-Slave), the first scenario comprised of 3 Base Stations (BS) and thirty Subscriber Station (SS) with one Master BS selected by the designed algorithm (Nearest Neighborhood Algorithms). …”
Get full text
Get full text
Article -
2
A new WDM Application Response Time in WLAN Network and Fixed WiMAX using Distributed
Published 2014“…Worldwide Interoperability for Microwave Access (WiMAX) and Wireless LAN (WLAN) has emerged as a promising solution for last mile access technology to provide high speed internet access in the residential as well as small and medium sized enterprise sectors. …”
Get full text
Get full text
Conference or Workshop Item -
3
Adaptive resource allocation algorithms with QoS support in OFDMA-based WiMAX networks
Published 2014“…The aim of this thesis is to develop a fair and effi- cient packet scheduling and adaptive multiuser frequency-time domain resources allocation algorithms to support QoS for a diverse service class in OFDMA based IEEE 802.16 network. …”
Get full text
Get full text
Thesis -
4
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
5
Lambda-max criteria weight determination in an adaptive neuro-fuzzy inference system / Rosma Mohd Dom, Daud Mohamad and Ajab Bai Akbarally
Published 2012“…In this research we will use the Lamda-max method of the AHP to determine the criteria weights to replace the weights used in the existing ANFIS. …”
Get full text
Get full text
Research Reports -
6
Face anti-spoofing using Convolutional Neural Networks / Siti Nurul Izzah Bahrain
Published 2024“…In this project, the Convolutional Neural Network (CNN) algorithm was implemented using TensorFlow in Python to detect fake face images. …”
Get full text
Get full text
Thesis -
7
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
8
Deterministic Automatic Test Pattern Generation for Built-In Self Test System
Published 2006“…To ease testing, digital systems are commonly designed with Built-In Self Test facility. For this reason, development of test pattern for BIST based on combination of Linear Feedback Shift Register (LFSR) and deterministic ATPG (DATPG) approach could provide more solutions, such as reduce testing time, high fault coverage and low area overhead. …”
Get full text
Get full text
Thesis -
9
New correlation for oil formation volume factor
Published 2014“…In this work, a new correlation for estimating oil formation volume factor (βo) using a Group Method of Data Handling (GMDH) technique was developed. It is a family of inductive algorithms which executes computer-based mathematical modeling of multi-parametric data sets. …”
Get full text
Get full text
Conference or Workshop Item -
10
-
11
-
12
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
13
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis -
14
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
17
Optimization of hydropower reservoir system using genetic algorithm for various climatic scenarios
Published 2015“…To determine the optimum solution in each policy, real coded genetic algorithm is used as an optimization technique. …”
Get full text
Get full text
Get full text
Thesis -
18
Machine-learning approach using thermal and synthetic aperture radar data for classification of oil palm trees with basal stem rot disease
Published 2021“…The machine learning algorithm consistently performs well when presented with a well-balanced dataset. …”
Get full text
Get full text
Thesis
