Search Results - (( wave optimization modified algorithm ) OR ( java application matching algorithm ))
Search alternatives:
- optimization modified »
- application matching »
- wave optimization »
- java application »
-
1
-
2
Heuristic optimization-based wave kernel descriptor for deformable 3D shape matching and retrieval
Published 2018“…This paper presents an optimized wave kernel signature (OWKS) using a modified particle swarm optimization (MPSO) algorithm. …”
Get full text
Get full text
Article -
3
Heuristic optimization-based wave kernel descriptor for deformable 3D shape matching and retrieval
Published 2018“…This paper presents an optimized wave kernel signature (OWKS) using a modified particle swarm optimization (MPSO) algorithm. …”
Get full text
Get full text
Article -
4
Joint optimization of resources allocation for quality of service aware next-generation heterogeneous cellular networks / Hayder Faeq Rasool Alhashimi
Published 2025“…The SARSA algorithm determines optimal power allocation that enhances EE by investigating different power levels. …”
Get full text
Get full text
Get full text
Thesis -
5
-
6
Enhancement and assessment of WKS variance parameter for intelligent 3D shape recognition and matching based on MPSO
Published 2017“…This paper presents an improved wave kernel signature (WKS) using the modified particle swarm optimization (MPSO)-based intelligent recognition and matching on 3D shapes. …”
Get full text
Get full text
Article -
7
-
8
Message based random variable length key encryption algorithm.
Published 2009Get full text
Get full text
Article -
9
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
-
11
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…The main algorithms used are profile determination and user similarity. …”
Get full text
Get full text
Thesis
