مرور Volume 2, Issue 1 بر اساس عنوان
در حال نمایش موارد 1 - 5 از 5
-
AHP Techniques for Trust Evaluation in Semantic Web
(Sari Branch, Islamic Azad University, 2011-02-01)The increasing reliance on information gathered from the web and other internet technologies raise the issue of trust. Through the development of semantic Web, One major difficulty is that, by its very nature, the semantic ...
-
Data Clustring Using A New CGA(Chaotic-Generic Algorithm) Approach
(Sari Branch, Islamic Azad University, 2011-02-01)Clustering is the process of dividing a set of input data into a number of subgroups. The members of each subgroup are similar to each other but different from members of other subgroups. The genetic algorithm has enjoyed ...
-
Prediction of Gain in LD-CELP Using Hybrid Genetic/PSO-Neural Models
(Sari Branch, Islamic Azad University, 2011-02-01)In this paper, the gain in LD-CELP speech coding algorithm is predicted using three neural models, that are equipped by genetic and particle swarm optimization (PSO) algorithms to optimize the structure and parameters of ...
-
Reduction in Cache Memory Power Consumption based on Replacement Quantity
(Sari Branch, Islamic Azad University, 2011-02-01)Today power consumption is considered to be one of the important issues. Therefore, its reduction plays a considerable role in developing systems. Previous studies have shown that approximately 50% of total power consumption ...
-
Service Differentiation of IEEE 802.11e
(Sari Branch, Islamic Azad University, 2011-02-01)The type of the applications for which Internet is being used has changed over the years. Multimedia applications, Real-time applications and Game playing require Quality of service. IEEE has proposed IEEE 802.11e, a quality ...



