Search Results - (( its applications drops algorithm ) OR ( based application use algorithm ))*
Search alternatives:
- applications drops »
- based application »
- its applications »
- application use »
- use algorithm »
-
1
-
2
Neighbour-based on-demand routing algorithms for mobile ad hoc networks
Published 2017“…In terms of the applications, The DCFP is more suitable to be used for education applications, while the SNBR is a good algorithm designed to be used for rescue system as data and energy is the main concern. …”
Get full text
Get full text
Get full text
Thesis -
3
-
4
Simulated Kalman Filter algorithms for solving optimization problems
Published 2019“…The proposed population-based SKF algorithm and the single solution-based SKF algorithm use the scalar model of discrete Kalman filter algorithm as the search strategy to overcome these flaws. …”
Get full text
Get full text
Thesis -
5
Quality of service management algorithms in WiMAX networks
Published 2015“…Thirdly, an energy algorithm called the Efficient Battery Life-aware Power Saving (EBLAPS) algorithm is proposed to address the problems of minimizing energy at the expense of response due to how energy sleep parameters are adjusted based on the residual energy and the use of standard sleep mode algorithms consumes high energy because of frequent transition to listening mode in the case of light traffic. …”
Get full text
Get full text
Thesis -
6
Deep Learning-Driven Mobility And Utility-Based Resource Management In Mm-Wave Enable Ultradense Heterogeneous Networks
Published 2025thesis::doctoral thesis -
7
Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment
Published 2011“…Besides, this algorithm provides home users or application developers to implement their own event operators with bespoke syntax for their application purpose by defining cross-events corresponding to the event operators. …”
Get full text
Get full text
Thesis -
8
Efficient task scheduling strategies using symbiotic organisms search algorithm for cloud computing environment
Published 2022“…The SOS and its variants Discrete Symbiotic Organisms Search (DSOS) algorithm have been used to solve different optimisation problems including tasks scheduling in cloud computing environment where results obtained are promising in comparison with stateof- the-art metaheuristic algorithms. …”
Get full text
Get full text
Thesis -
9
-
10
Markov-modulated bernoulli-based performance analysis for gentle BLUE and BLUE algorithms under bursty and correlated traffic
Published 2024journal::journal article -
11
Cloud-based lightweight detection of hardhat compliance based on YOLOv5 in power construction site
Published 2025“…Implementing deep learning-based object detection algorithms can facilitate the enforcement of hardhat-wearing compliance, thereby reducing work-related injuries and fatalities. …”
Get full text
Get full text
Thesis -
12
Development of predictive modeling and deep learning classification of taxi trip tolls
Published 2022“…Commercial navigation includes a wealth of trip-related data, including distance, expected journey time, and tolls that may be encountered along the way. Using a classification algorithm, it is possible to extract drop-off and pickup locations from taxi trip data and estimate if the tour would incur tolls. …”
Get full text
Get full text
Get full text
Article -
13
-
14
Electronic Tongue: Study on the Freshness of Milk
Published 2012Get full text
Get full text
Final Year Project -
15
Effects of Authentication of Users in Mobile Internet Protocol Version 6
Published 2004“…User security in the Internet has generally been well taken care of at the application layer. Judging from the mobility and portability of a mobile terminal and its ability to get connected to the Internet while away from home, it becomes necessary to be sure of who is using that terminal. …”
Get full text
Get full text
Thesis -
16
Fractal coding of bio-metric image for face authentication
Published 2021“…This thesis implements the algorithms for the Methods of CPM, BPBM fractal coding, and its application. …”
Get full text
Get full text
Thesis -
17
Blind Source Separation Using Two-Dimensional Nonnegative Matrix Factorization In Biomedical Field
Published 2018“…Theoretically,β and α is parameters that used to vary the NMF2D algorithm in order to yield high SDR value. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Dynamic Occupant Adaptive Energy Management System (DOAEM) for Smart Building
Published 2024Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
QoS evaluation of different TCPs congestion control algorithm using NS2
Published 2006Get full text
Get full text
Get full text
Proceeding Paper -
20
