Search Results - (( quality function max algorithm ) OR ( java application customization algorithm ))

  • Showing 1 - 13 results of 13
Refine Results
  1. 1
  2. 2

    Effective downlink resource management for wimax networks by Shareef, Zayd Ashraf Najeeb

    Published 2018
    “…The interest in Quality of Service (QoS) for broadband wireless access networks has been growing considerably because of the need for efficient data access, particularly in WiMAX networks. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5
  6. 6

    Performance comparison of differential evolution and particle swarm optimization in constrained optimization by Iwan, Mahmud, Akmeliawati, Rini, Faisal, Tarig, Al-Assadi, Hayder M.A.A.

    Published 2012
    “…Here, the constrained optimization is represented by some selected standard benchmark functions. A new constraint handling and stopping criterion technique is also adopted in the optimization algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Adaptive resource allocation algorithms with QoS support in OFDMA-based WiMAX networks by Alsahag, Ali Mohamemed Mansor

    Published 2014
    “…In Worldwide Interoperability for Microwave Access (WiMAX) the primary concern is Quality of Service (QoS) support which aims to satisfy the diverse service requirements and to guarantee higher data rates allocation for different service classes. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Embedded Artificial Intelligent (AI) To Navigate Cart Follower by Tang, Khai Luen

    Published 2018
    “…The training algorithm may also vary with different sets of parameters, number of neurons and activation function. …”
    Get full text
    Get full text
    Monograph
  9. 9

    Fractal coding of bio-metric image for face authentication by Ahadullah, Md

    Published 2021
    “…In the encoding, the fractal function converges to its self-similarity as IFS. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Obstacle avoidance robot using sonar sensor (OARuS) by Mohamad Sabri Abdullah

    Published 2008
    “…After I test these sensors, I choose to use an LV-MaxSonar@EZ1 as my transducer because these sensors have more advantage such as easy to use, range stability, continuously variable gain, quality beam shape, wave form analysis, calibration and test, very small size (and weight), low cost, low power, and wide operating voltage for this system. …”
    Get full text
    Learning Object
  13. 13

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item