Search Results - (( media applications use algorithm ) OR ( parameter application based algorithm ))
Search alternatives:
- parameter application »
- media applications »
- application based »
- applications use »
- use algorithm »
-
1
Advances of metaheuristic algorithms in training neural networks for industrial applications
Published 2023Article -
2
-
3
A firefly algorithm based hybrid method for structural topology optimization
Published 2020“…In this paper, a firefly algorithm based hybrid algorithm through retaining global convergence of firefly algorithm and ability to generate connected topologies of optimality criteria (OC) method is proposed as an alternative method to solve stress-based topology optimization problems. …”
Get full text
Get full text
Article -
4
-
5
Particle filter approach for tracking indoor user location using IEEE 802.11 signals
Published 2011“…Moreover, the use of light estimation algorithms such as fingerprinting, ranking algorithm, Weighted Centroid method, k-Nearest Neighbour, did not give a good tracking result. …”
Get full text
Get full text
Get full text
Article -
6
Adaptive Traffic Prioritization Algorithm Over Ad Hoc Network Using IEEE 802.11e
Published 2016“…This thesis proposes an adaptive traffic prioritization algorithm over ad hoc network using IEEE 802.11e standard that defines a set of Quality of Service enhancements for wireless LAN applications through modifications to the Media Access Control (MAC) layer. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Particle filter approach for estimating indoor mobile user location using IEEE 802.11 signals (F1090)
Published 2011“…Moreover, the use of light estimation algorithms such as fingerprinting, ranking algorithm, Weighted Centroid method, k-Nearest Neighbour, did not give a good tracking result. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
-
9
-
10
-
11
Intelligent Multi-cellular Network Connectivity for Internet of Things Applications
Published 2023Conference Paper -
12
Mobility management schemes based on multiple criteria for optimization of seamless handover in long term evolution networks
Published 2014“…The burgeoning growth of real-time applications such as interactive video and voice communications and other media rich contents, places a heavy demand on the network for high data rate and guaranteed quality of service (QoS). …”
Get full text
Get full text
Thesis -
13
Slight-Delay Shaped Variable Bit Rate (SD-SVBR) Technique for Video Transmission
Published 2011“…SVBR algorithm is devised for real-time video applications and it has several limitations and weaknesses due to its embedded estimation or prediction processes. …”
Get full text
Get full text
Get full text
Thesis -
14
Grey wolf optimization for enhanced performance in wind power system with dual-star induction generators
Published 2025“…This study contributes valuable insights into the effective application of meta-heuristic algorithms for optimizing dual-star induction generators in wind power systems. …”
Article -
15
-
16
The Development And Evaluation Of Personalized Learning Material Based On A Profiling Algorithm For Polytechnic Students In Learning Algebra
Published 2016“…The recommendation is computed using a Case-based Reasoning (CBR) algorithm by finding the similarity between the new submitted profile and the stored profiles in the database. …”
Get full text
Get full text
Thesis -
17
-
18
Development of Web services fuzzy quality models using data clustering approach
Published 2014“…This paper presents the fuzzy clustering of web services' quality of service (QoS) data using Fuzzy C-Means (FCM) algorithm. It was conducted based on actual QoS data gathered from the network. …”
Get full text
Get full text
Article -
19
-
20
Applications of contemporary artificial intelligence technology in forensic odontology as primary forensic identifier : A scoping review
Published 2022“…Objective: This article aims to evaluate current artificial intelligence applications and discuss their performance concerning the algorithm architecture used in forensic odontology. …”
Get full text
Get full text
Get full text
Article
