Search Results - (( its application _ algorithm ) OR ( some applications ((max algorithm) OR (based algorithm)) ))*
Search alternatives:
- some applications »
- its application »
- max algorithm »
-
1
Max degree around (MDA) algorithm: a smart and efficient approximate algorithm for Vertex cover and independent set problems
Published 2016“…These problems motivated to propose Max Degres Around (MDA) approximation algorithm for the MVC problem. …”
Get full text
Get full text
Get full text
Article -
2
Prediction and multi-criteria-based schemes for seamless handover mechanism in mobile WiMAX networks
Published 2013“…This enables it to meet the MS application requirements based on some criteria such as CINR, BW, and delay. …”
Get full text
Get full text
Thesis -
3
Seamless horizontal handover algorithm for homogeneous wireless mobile networks using fuzzy logic
Published 2013“…The most important and society application of WiMAX is the mobile communication. When a mobile station changes its geographical position, it may also need to change its attachment point in the network in order to retain the quality of the connection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
A primary interface selection policy in heterogeneous networks based on QoS
Published 2012“…Mobile users should be connected with appropriate interfaces based on the application types and its requirements. …”
Get full text
Get full text
Get full text
Proceeding Paper -
5
-
6
-
7
-
8
A modified generalized RBF model with EM-based learning algorithm for medical applications
Published 2006“…Moreover, GRBF trained by the new algorithm has an apparent statistical meaning. Experimental results show potentials for real-life applications.…”
Get full text
Get full text
Get full text
Proceeding Paper -
9
Ant colony optimization based subset feature selection in speech processing: Constructing graphs with degree sequences
Published 2024journal::journal article -
10
A block-based multi-scale background extraction algorithm
Published 2010“…In addition, an amended multi-scale algorithm is introduced. This algorithm is a hybrid algorithm, a combination of some nonparametric and parametric filters. …”
Get full text
Get full text
Article -
11
Interference avoidance routing and scheduling using multiple transceivers for IEEE 802.16 mesh network
Published 2010“…These algorithms have two advantages: first, they avoid the collision with neighbouring nodes. …”
Get full text
Get full text
Thesis -
12
-
13
A new WDM Application Response Time in WLAN Network and Fixed WiMAX using Distributed
Published 2014“…The WiMAX network does not provide sufficient QoS with respect to Application Response Time. …”
Get full text
Get full text
Conference or Workshop Item -
14
Ant colony optimization in dynamic environments
Published 2010“…In order to achieve this objective, six ant algorithms namely Ant System (AS), Ant Colony System (ACS), Best-Worst Ant System (BWAS), Elitist Ant System (EAS), Max-Min Ant System (MMAS) and Rank-Based Ant System (RBAS) were implemented to solve a dynamic optimization problem in the form of the dynamic Traveling Salesman Problem (TSP). …”
Get full text
Get full text
Get full text
Thesis -
15
Multi-base number representation in application to scalar multiplication and pairing computation
Published 2011“…The multi-bases number representation is also applied to construct another new elliptic curve joint-scalar multiplication algorithm, called the joint-multi base algorithm. …”
Get full text
Get full text
Thesis -
16
Rule pruning techniques in the ant-miner classification algorithm and its variants: A review
Published 2018“…Rule-based classification is considered an important task of data classification.The ant-mining rule-based classification algorithm, inspired from the ant colony optimization algorithm, shows a comparable performance and outperforms in some application domains to the existing methods in the literature.One problem that often arises in any rule-based classification is the overfitting problem. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
Get full text
Get full text
Thesis -
18
-
19
Simulated Kalman Filter algorithms for solving optimization problems
Published 2019“…Applications and improvements to the HKA algorithm suggest that optimization algorithm based on estimation principle has a huge potential in solving a wide variety of optimization problems. …”
Get full text
Get full text
Thesis -
20
