Search Results - (( java application matching algorithm ) OR ( variable optimization max algorithm ))
Search alternatives:
- variable optimization »
- application matching »
- java application »
- optimization max »
- max algorithm »
-
1
-
2
Maximum 2-satisfiability in radial basis function neural network
Published 2020“…Correctly, this logic plays a prominent role in numerous applications as a combinatorial optimization logic. MAX2SAT is a case of MAX-kSAT and is written in Conjunctive Normal Form (CNF) with two variables in each clause. …”
Get full text
Get full text
Get full text
Article -
3
Prediction and multi-criteria-based schemes for seamless handover mechanism in mobile WiMAX networks
Published 2013“…Mobile WiMAX introduces several interesting advantages including last mile wireless access, variable and high data rate, point to multi-point communication, large frequency range and QoS (Quality of Service) for various types of applications. …”
Get full text
Get full text
Thesis -
4
Single Fitness Function to Optimize Energy using Genetic Algorithms for Wireless Sensor Network
Published 2024journal::journal article -
5
Design Optimization of a Gas Turbine Engine for Marine Applications: Off-Design Performance and Control System Considerations
Published 2022“…Meta-heuristic optimizations, namely a genetic algorithm (GA) and a whale optimization algorithm (WOA), are applied to optimize the designed control system. …”
Get full text
Get full text
Article -
6
Interference avoidance routing and scheduling using multiple transceivers for IEEE 802.16 mesh network
Published 2010“…Here, a routing tree is constructed based on the energy/bit minimization routing (EbMR). This algorithm looks for a short path from the subscriber station (SS) node to BS, while the optimal path is achieved when the whole path has the lowest EbMR. …”
Get full text
Get full text
Thesis -
7
-
8
-
9
Message based random variable length key encryption algorithm.
Published 2009Get full text
Get full text
Article -
10
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
-
12
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…The main algorithms used are profile determination and user similarity. …”
Get full text
Get full text
Thesis
