Thread / Post | Tags | ||
Title: Heuristic and Metaheuristic Algorithms Page Link: Heuristic and Metaheuristic Algorithms - Posted By: swadhinammu Created at: Thursday 17th of August 2017 05:25:48 AM | |||
Heuristic and Metaheuristic Algorithms | |||
| |||
Title: literature survey for dynamic search algorithms in unstructured peer to peer network Page Link: literature survey for dynamic search algorithms in unstructured peer to peer network - Posted By: ananya mohanty88 Created at: Thursday 05th of October 2017 04:46:00 AM | |||
To get full information or details of literature survey for dynamic search algorithms in unstructured peer to peer networks please have a look on the pages | |||
| |||
Title: Heuristic Burst Construction Algorithm for Improving Downlink Capacity in IEEE 8021 Page Link: Heuristic Burst Construction Algorithm for Improving Downlink Capacity in IEEE 8021 - Posted By: electronix Created at: Thursday 05th of October 2017 04:07:39 AM | |||
Abstract IEE 802.16 OFDMA systems have gained much attention for their ability to support high transmission rates and broadband access services. For multiuser environments, IEE 802.16 OFDMA systems require a resource allocation algorithm to use the limited downlink resource efficiently. The IEE 802.16 standard defines that resource allocation should be performed with a rectangle region of slots, called a burst. However, the standard does not specify how to construct bursts. In this paper, we propose a heuristic burst construction algorithm, ca ....etc | |||
Title: what is dataset query algorithms in streaming mining Page Link: what is dataset query algorithms in streaming mining - Posted By: soniamohandas Created at: Thursday 17th of August 2017 08:01:40 AM | |||
Hii..i need information on the topic dataset technology query algorithm in streaming mining..please help me as i need ppt on this topic as soon as possible. ....etc | |||
Title: A Survey of Encryption Algorithms Page Link: A Survey of Encryption Algorithms - Posted By: tulasiprasad Created at: Thursday 17th of August 2017 06:32:31 AM | |||
This paper introduces major topics of cryptography such as basic terminology and encryption methods. It then discusses the two types of encryption algorithms available, which are symmetric and public-key. These two types are compared based on how keys are distributed and implementation. Next, the only known algorithm that is considered perfectly secure, a one-time pad, is discussed and why it is rarely used in spite of its strong security. A chapter devoted to key management follows this. A separate section is devoted to key management, because ....etc | |||
Title: literature survey on mining web graphs for recommendations project Page Link: literature survey on mining web graphs for recommendations project - Posted By: thoppil Created at: Thursday 05th of October 2017 04:13:53 AM | |||
To get full information or details of mining web graphs for recommendations please have a look on the pages | |||
Title: A Survey of Uncertain Data Algorithms and Applications Page Link: A Survey of Uncertain Data Algorithms and Applications - Posted By: lipika Created at: Thursday 05th of October 2017 04:59:11 AM | |||
In recent years, a number of indirect data collection methodologies have led to the proliferation of uncertain data. Such databases are much more complex because of the additional challenges of representing the probabilistic information. In this paper, we provide a survey of uncertain data mining and management applications. We will explore the various models utilized for uncertain data representation. In the field of uncertain data management, we will examine traditional database management methods such as join processing, query processing, se ....etc | |||
Title: HEURISTIC ALGORITHM FOR CLIQUE PROBLEM Page Link: HEURISTIC ALGORITHM FOR CLIQUE PROBLEM - Posted By: tauseefmd Created at: Thursday 05th of October 2017 05:13:39 AM | |||
This paper provides a heuristic algorithm for an NP-Complete problem. It is a result of a research on an NP-Complete problem known as Clique problem. I have succeeded in developing an algorithm which will give the maximum size Clique, for a given graph G, as its output. This paper explains the algorithm, its time complexity, applications and its implementation in C. This is a research paper based on an interesting class of problems known as ?NP-Complete? problems. No polynomial-time algorithm has yet been discovered for an NP-Complete problem, ....etc | |||
Title: sp mining algorithms in java Page Link: sp mining algorithms in java - Posted By: vakasthe Created at: Thursday 05th of October 2017 04:37:27 AM | |||
to get information about the topic sp mining algorithms related topic refer the page link bellow | |||
Title: heuristic based query processing for large rdf graphs using cloud computing coding a Page Link: heuristic based query processing for large rdf graphs using cloud computing coding a - Posted By: jaeksjayakrishnan Created at: Thursday 05th of October 2017 04:17:06 AM | |||
Please provide the heuristic based query processing for large rdf graphs using cloud computing coding and documentation ....etc | |||
Please report us any abuse/complaint to "omegawebs @ gmail.com" |