Search Results - (( parallel distributed normal algorithm ) OR ( java application matching algorithm ))
Search alternatives:
- application matching »
- distributed normal »
- normal algorithm »
- java application »
-
1
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023“…This implementation will be based on parallel distributed model, which will reduce the complexity of each microcontroller to solve large complex problem and increase problem solving speed. � 2008 IEEE.…”
Conference paper -
2
-
3
Parallel distributed computational microcontroller system for adaptive antenna downlink transmitter power optimization
Published 2023“…Parallel Distributed Genetic Algorithm (PDGA) is employed in adaptive beam forming technique to reduce power usage of adaptive antenna at WCDMA base station. …”
Article -
4
Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer
Published 2023“…It is because the parallel mechanism is able to handle high-speed streaming data. …”
Get full text
Get full text
Thesis -
5
-
6
Estimation of core size distribution of magnetic nanoparticles using high-Tc SQUID magnetometer and particle swarm optimizer-based inversion technique
Published 2023“…The PSO inverse technique is then applied to the magnetization curve to construct the magnetic moment distribution. A multimodal normalized log-normal distribution was used in the minimization of the objective function of the PSO inversion technique, and a modification of the PSO search region is proposed to improve the exploration and exploitation of the PSO particles. …”
Get full text
Get full text
Get full text
Article -
7
-
8
-
9
Message based random variable length key encryption algorithm.
Published 2009Get full text
Get full text
Article -
10
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
-
12
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…The main algorithms used are profile determination and user similarity. …”
Get full text
Get full text
Thesis
