Search Results - (( developing term evolution algorithm ) OR ( java ((data function) OR (a function)) algorithm ))
Search alternatives:
- evolution algorithm »
- developing term »
- data function »
- a function »
- java »
-
1
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
2
-
3
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…For the user to analyze the result, the system provides visual analytics technique which can educate the user on analyzing the result which is drill down and sorting function to educate users. The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
Get full text
Get full text
Thesis -
4
Resource allocation in coordinated multipoint long term evolution-advanced networks
Published 2015“…Coordinated Multipoint (CoMP) in Long Term Evolution-Advanced (LTE- Advanced) improves the cell-edge data rates and the network spectral efficiency through base station coordination. …”
Get full text
Get full text
Thesis -
5
On fractional and semi-soft handover in long term evolution(LTE) networks
Published 2011“…In this paper a hybrid HO algorithms called semi-soft handover (SSHO) and fractional soft handover (FSHO) in long term evolution (LTE) system are studied. …”
Get full text
Get full text
Conference or Workshop Item -
6
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
Get full text
Get full text
Get full text
Article -
7
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
8
Image clustering comparison of two color segmentation techniques
Published 2010“…The image clustering is major part of data mining where study about how to binds the similar data together in a cluster and show the meaningful data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
A new modified differential evolution algorithm scheme-based linear frequency modulation radar signal de-noising
Published 2015“…The main intention of this study was to investigate the development of a new optimization technique based on the differential evolution (DE) algorithm, for the purpose of linear frequency modulation radar signal de-noising. …”
Get full text
Get full text
Article -
10
Developing a hybrid model for accurate short-term water demand prediction under extreme weather conditions: a case study in Melbourne, Australia
Published 2024“…Principle component analysis was used to determine which predictors were most reliable. Hybrid model development included the optimization of ANN coefficients (its weights and biases) using adaptive guided differential evolution algorithm. …”
Article -
11
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…J2ME phone and Symbian Operating System (OS) as the platform for the application to run. The encryption algorithm that implemented in the system is Advanced Encryption Standard (AES) with 128-bit block size and together with the SHA1 (Secure Hash Algorithm) hash functions. …”
Get full text
Get full text
Conference or Workshop Item -
12
Special protection and control scheme based on generation rescheduling using differential evolution and electromagnetism-like algorithm
Published 2016“…The performance of the proposed DEAM algorithm is validated with both the normal DE and Genetic Algorithm (GA) in terms of the fitness convergence and generation fuel cost. …”
Get full text
Get full text
Thesis -
13
A study on channel and delay-based scheduling algorithms for live video streaming in the fifth generation long term evolution-advanced
Published 2022“…These algorithms were developed for use in the legacy wireless networks and minor changes were made to enable these algorithms to perform packet scheduling in the downlink 5G LTE-A. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
14
The Development Of A Robust Algorithm For Uav Path Planning In 3d Environment
Published 2016“…Thus, a new algorithm known as infection evolution (IE) was developed in this study. …”
Get full text
Get full text
Thesis -
15
Differential evolution for neural networks learning enhancement
Published 2008“…Three programs have developed; Differential Evolution Neural Network (DENN), Genetic Algorithm Neural Network (GANN) and Particle Swarm Optimization with Neural Network (PSONN) to probe the impact of these methods on ANN learning using various datasets. …”
Get full text
Get full text
Get full text
Thesis -
16
Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff
Published 2017“…The results showed that the QEEA algorithm outperformed the other algorithms as it could achieve up to 18% of maximum throughput, 27% reduction in ECR, and 36% improvement in EE in terms of radius ranging from 200 m to 1000 m. …”
Get full text
Get full text
Thesis -
17
Efficient radio resource management algorithms for downlink long term evolution networks
Published 2018“…Hence, the major problem is developing a scheduling algorithm which creates a trade-off between the system performances. …”
Get full text
Get full text
Thesis -
18
Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff
Published 2018“…In Third Generation Partnership Project (3GPP) Long Term Evolution (LTE) networks, ever-higher data rate and energy efficiency (EE) are required to meet the increasing demands in cellular traffic. …”
Get full text
Get full text
Book Section -
19
-
20
