Search Results - (( java application during algorithm ) OR ( using evolution max algorithm ))
Search alternatives:
- application during »
- java application »
- during algorithm »
- using evolution »
- evolution max »
- max algorithm »
-
1
Performance comparison of differential evolution and particle swarm optimization in constrained optimization
Published 2012“…Particle swarm optimization (PSO) and differential evolution (DE) are among the well-known modern optimization algorithms. …”
Get full text
Get full text
Get full text
Article -
2
Enhancing the QoS performance for mobile station over LTE and WiMAX networks / Mhd Nour Hindia
Published 2015“…These algorithms can improve mobile stations’ quality of service as well as guarantee seamless mobility across the Long-Term Evolution (LTE) and Worldwide Interoperability for Microwave Access (WiMAX) technologies. …”
Get full text
Get full text
Thesis -
3
Enhanced handover decision algorithm in heterogeneous wireless network
Published 2017“…The algorithm consists of three technology interfaces: Long-Term Evolution (LTE), Worldwide interoperability for Microwave Access (WiMAX) and Wireless Local Area Network (WLAN). …”
Get full text
Get full text
Get full text
Article -
4
Improved handover decision algorithm using multiple criteria
Published 2018“…Additionally, three technology interfaces were embedded in this study including Worldwide interoperability for Microwave Access (WiMAX), Wireless Local Area Network (WLAN), and Long-Term Evolution (LTE). …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Maximum-largest weighted delay first algorithm for heterogeneous traffic in 4G networks
Published 2018“…Packet Loss Ratio (PLR), and Mean User Throughput performance measures were used to validate the performance of M-LWDF algorithm against other algorithms using similar mobile environment. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
7
Power amplifier memory polynomial predistorter for long term evolution application
Published 2015“…These nonlinear modeling techniques can be applied to the design of successful predistortion algorithms. The overall structure of a linearized transmitter using Memory Polynomial Digital Predistortion (MP DPD) architecture is represented to obtain both linearity and efficiency of the nonlinear PAs. …”
Get full text
Get full text
Thesis -
8
Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture
Published 2010“…It is shown that the computational complexity of proposed FAST-QR detection algorithm is approximately 48 % lower than the conventional QR decomposition detection algorithm. …”
Get full text
Get full text
Thesis -
9
Stress analysis and fatigue life prediction of a wobble-plate
Published 2006“…The fatigue life prediction is performed using Brown-Miller algorithm with Morrow mean stress correction method. …”
Get full text
Get full text
Get full text
Thesis -
10
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
11
-
12
-
13
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
14
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis -
15
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis
