Proposal of a Two Way Sorting Algorithm and Performance Comparison with Existing Algorithms

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

a comparison of teachers and supervisors, with respect to teacher efficacy and reflection

supervisors play an undeniable role in training teachers, before starting their professional experience by preparing them, at the initial years of their teaching by checking their work within the proper framework, and later on during their teaching by assessing their progress. but surprisingly, exploring their attributes, professional demands, and qualifications has remained a neglected theme i...

15 صفحه اول

a comparison of linguistic and pragmatic knowledge: a case of iranian learners of english

در این تحقیق دانش زبانشناسی و کاربردشناسی زبان آموزان ایرانی در سطح بالای متوسط مقایسه شد. 50 دانش آموز با سابقه آموزشی مشابه از شش آموزشگاه زبان مختلف در دو آزمون دانش زبانشناسی و آزمون دانش گفتار شناسی زبان انگلیسی شرکت کردند که سوالات هر دو تست توسط محقق تهیه شده بود. همچنین در این تحقیق کارایی کتابهای آموزشی زبان در فراهم آوردن درون داد کافی برای زبان آموزان ایرانی به عنوان هدف جانبی تحقیق ...

15 صفحه اول

A Two-dimensional Warranty Model with Consideration of Customer and Manufacturer Objectives Solved with Non-dominated Sorting Genetic Algorithm

Warranty is a powerful implement for marketing strategy that is used by manufacturersand creates satisfaction for consumers by ensuring to compensate for incorrect operation of the product. Warranty serviceresults ina cost named warranty cost for a manufacturer.This cost is a function of warranty policy, regions, and product failures pattern. Since this service coversthe cost of uncertain failu...

متن کامل

A Performance Comparison of Ciphering Algorithms with the sWIFI Algorithm

Ciphering algorithms play a main role in WLAN security systems. However, those algorithms consume a significant amount of computing resources such as CPU time, and packet size. In an attempt to remedy the WLAN security issue, a novel method has been deployed to secure the transmitted data over wireless network, called a secure WiFi (sWiFi) algorithm. This paper also provides evaluation of five ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Science, Engineering and Applications

سال: 2012

ISSN: 2231-0088

DOI: 10.5121/ijcsea.2012.2306