Search Results - (( java application customization algorithm ) OR ( quality function max algorithm ))
Search alternatives:
- customization algorithm »
- java application »
- max algorithm »
- function max »
-
1
Maximum 2-satisfiability in radial basis function neural network
Published 2020Get full text
Get full text
Get full text
Article -
2
Effective downlink resource management for wimax networks
Published 2018“…The interest in Quality of Service (QoS) for broadband wireless access networks has been growing considerably because of the need for efficient data access, particularly in WiMAX networks. …”
Get full text
Get full text
Thesis -
3
Fair uplink bandwidth allocation and latency guarantee for mobile WiMAX using fuzzy adaptive deficit round robin
Published 2014“…In this paper, an efficient bandwidth allocation algorithm for the uplink traffic in mobile WiMAX is proposed. …”
Get full text
Get full text
Get full text
Article -
4
-
5
Single Fitness Function to Optimize Energy using Genetic Algorithms for Wireless Sensor Network
Published 2024journal::journal article -
6
Performance comparison of differential evolution and particle swarm optimization in constrained optimization
Published 2012“…Here, the constrained optimization is represented by some selected standard benchmark functions. A new constraint handling and stopping criterion technique is also adopted in the optimization algorithm. …”
Get full text
Get full text
Get full text
Article -
7
Adaptive resource allocation algorithms with QoS support in OFDMA-based WiMAX networks
Published 2014“…In Worldwide Interoperability for Microwave Access (WiMAX) the primary concern is Quality of Service (QoS) support which aims to satisfy the diverse service requirements and to guarantee higher data rates allocation for different service classes. …”
Get full text
Get full text
Thesis -
8
Embedded Artificial Intelligent (AI) To Navigate Cart Follower
Published 2018“…The training algorithm may also vary with different sets of parameters, number of neurons and activation function. …”
Get full text
Get full text
Monograph -
9
Fractal coding of bio-metric image for face authentication
Published 2021“…In the encoding, the fractal function converges to its self-similarity as IFS. …”
Get full text
Get full text
Thesis -
10
-
11
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
12
Obstacle avoidance robot using sonar sensor (OARuS)
Published 2008“…After I test these sensors, I choose to use an LV-MaxSonar@EZ1 as my transducer because these sensors have more advantage such as easy to use, range stability, continuously variable gain, quality beam shape, wave form analysis, calibration and test, very small size (and weight), low cost, low power, and wide operating voltage for this system. …”
Get full text
Learning Object -
13
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
