Search Results - (( evolution application a algorithm ) OR ( java application matching algorithm ))
Search alternatives:
- evolution application »
- application matching »
- java application »
- application a »
- a algorithm »
-
1
-
2
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…The scenario of distributed knowledge in organization, lack of understanding of knowledge sharing benefits and technology inadequacies are the main barriers to knowledge sharing facilitation. A more user-centered application through personalization and intelligent assistance technique are identified as the evolution in knowledge sharing facilitation research. …”
Get full text
Get full text
Thesis -
3
Two level Differential Evolution algorithms for ARMA parameters estimatio
Published 2013Get full text
Get full text
Get full text
Proceeding Paper -
4
-
5
-
6
-
7
-
8
-
9
Text steganalysis using evolution algorithm approach
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
10
-
11
An improved component carrier selection algorithm for downlink long term evolution advanced
Published 2014“…Additionally, LTE-A system needs to simultaneously support a mixture of LTE-A and Long Term Evolution (LTE) users. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
-
13
-
14
An investigation of packet scheduling algorithms for long term evolution-advanced
Published 2012Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
15
Special protection and control scheme based on generation rescheduling using differential evolution and electromagnetism-like algorithm
Published 2016“…The main objective of this research is designing a Special Protection and Control Scheme (SPCS) based on a hybrid approach of combining Differential Evolution (DE) and Electromagnetism-Like algorithms. …”
Get full text
Get full text
Thesis -
16
Message based random variable length key encryption algorithm.
Published 2009Get full text
Get full text
Article -
17
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
-
19
Novel scheduling algorithm for optimizing real-time multimedia performance in Long-Term Evolution Advanced
Published 2017“…Given that Long Term Evolution-Advanced (LTE-A) which is an emerging mobile cellular standard needs to support these multimedia applications, packet scheduling is of paramount importance in LTE-A. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
20
