Search Results - (( java application customization algorithm ) OR ( parameter adaptation max algorithm ))
Search alternatives:
- customization algorithm »
- parameter adaptation »
- java application »
- adaptation max »
- max algorithm »
-
1
Fuzzy Logic Based Self-Adaptive Handover Algorithm for MobileWiMAX.
Published 2013“…The proposed algorithm is derived from the self-adaptive handover parameters to overcome the mobile WiMAX ping-pong handover and handover delay issues. …”
Get full text
Get full text
Article -
2
Quality of service management algorithms in WiMAX networks
Published 2015“…Firstly, a QoS-Aware CAC scheme for Mobile WiMAX networks is proposed to prevent the starvation problem of the highest and the lowest service classes due to the linear adaptation technique used to accommodate more users into the network as well as inefficient bandwidth utilization because of the way the adaptive reserved bandwidth threshold for handoff is adjusted. …”
Get full text
Get full text
Thesis -
3
Prediction and multi-criteria-based schemes for seamless handover mechanism in mobile WiMAX networks
Published 2013“…The third scheme is a fuzzy logic-based self-adaptive handover (called FuzSAHO) for handover decision to provide an intelligent self-adaptive handover parameters technique based on received signal strength indicator (RSSI) and MS velocity. …”
Get full text
Get full text
Thesis -
4
Reactive approach for automating exploration and exploitation in ant colony optimization
Published 2016“…The third component is the ACO-based adaptive parameter selection algorithm to solve the parameterization problem which relies on quality, exploration and unified criteria in assigning rewards to promising parameters. …”
Get full text
Get full text
Get full text
Thesis -
5
Lambda-max criteria weight determination in an adaptive neuro-fuzzy inference system / Rosma Mohd Dom, Daud Mohamad and Ajab Bai Akbarally
Published 2012“…A neuro-fuzzy system is a fuzzy system that uses learning algorithms derived from or inspired by neural network theory to determine its parameters (fuzzy sets and fuzzy rules) by processing data samples. …”
Get full text
Get full text
Research Reports -
6
-
7
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
8
An intelligent network selection mechanism for vertical handover decision in vehicular Ad Hoc wireless networks
Published 2020“…The proposed intelligent network selection is known as the Adaptive Handover Decision (AHD) scheme that uses Fuzzy Logic (FL) and Simple Additive Weighting (SAW) algorithms, namely F-SAW scheme. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
