Proposal of a Two Way Sorting Algorithm and Performance Comparison with Existing Algorithms
نویسندگان
چکیده
منابع مشابه
a comparison of teachers and supervisors, with respect to teacher efficacy and reflection
supervisors play an undeniable role in training teachers, before starting their professional experience by preparing them, at the initial years of their teaching by checking their work within the proper framework, and later on during their teaching by assessing their progress. but surprisingly, exploring their attributes, professional demands, and qualifications has remained a neglected theme i...
15 صفحه اولcomparison of the amount of debris extruded apically in two rotary techniques: flexmaster and m2
چکیده ندارد.
15 صفحه اولa comparison of linguistic and pragmatic knowledge: a case of iranian learners of english
در این تحقیق دانش زبانشناسی و کاربردشناسی زبان آموزان ایرانی در سطح بالای متوسط مقایسه شد. 50 دانش آموز با سابقه آموزشی مشابه از شش آموزشگاه زبان مختلف در دو آزمون دانش زبانشناسی و آزمون دانش گفتار شناسی زبان انگلیسی شرکت کردند که سوالات هر دو تست توسط محقق تهیه شده بود. همچنین در این تحقیق کارایی کتابهای آموزشی زبان در فراهم آوردن درون داد کافی برای زبان آموزان ایرانی به عنوان هدف جانبی تحقیق ...
15 صفحه اولA Two-dimensional Warranty Model with Consideration of Customer and Manufacturer Objectives Solved with Non-dominated Sorting Genetic Algorithm
Warranty is a powerful implement for marketing strategy that is used by manufacturersand creates satisfaction for consumers by ensuring to compensate for incorrect operation of the product. Warranty serviceresults ina cost named warranty cost for a manufacturer.This cost is a function of warranty policy, regions, and product failures pattern. Since this service coversthe cost of uncertain failu...
متن کاملA Performance Comparison of Ciphering Algorithms with the sWIFI Algorithm
Ciphering algorithms play a main role in WLAN security systems. However, those algorithms consume a significant amount of computing resources such as CPU time, and packet size. In an attempt to remedy the WLAN security issue, a novel method has been deployed to secure the transmitted data over wireless network, called a secure WiFi (sWiFi) algorithm. This paper also provides evaluation of five ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Science, Engineering and Applications
سال: 2012
ISSN: 2231-0088
DOI: 10.5121/ijcsea.2012.2306