Search Results - (( based coding growth algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- implication based »
- growth algorithm »
- java implication »
- based coding »
-
1
Energy-driven scheduling for Digital Video Broadcasting - Satellite Second Generation (DVB-S2)
Published 2013“…Based on energy efficiency of each modulation and coding scheme (MODCOD) available in Digital Video Broadcasting - Satellite Second Generation (DVB-S2), the EEF algorithm improves a scheduling mechanism of a two-step scheduler by selecting frames to be transmitted next according to “energy efficiency” policy developed. …”
Get full text
Get full text
Conference or Workshop Item -
2
-
3
Recent advances of whale optimization algorithm, its versions and applications
Published 2024“…One of the SI algorithms is called the whale optimization algorithm (WOA). …”
Book chapter -
4
Video abstraction using density-based clustering algorithm
Published 2017Get full text
Get full text
Get full text
Article -
5
An FPGA implementation of Alamouti's transmit diversity technique
Published 2008“…However, there are limits to growth, and the radio spectrum used for wireless communications is a finite resource. …”
Get full text
Get full text
Thesis -
6
A Bat-inspired Strategy for Pairwise Testing
Published 2015“…Owing to exponential growth of software lines of codes (LOC)s, testing becomes painstakingly difficult activities. …”
Get full text
Get full text
Get full text
Article -
7
Self-configured link adaptation using channel quality indicator-modulation and coding scheme mapping with partial feedback for green long-term evolution cellular systems
Published 2015“…On the user side, a partial channel feedback scheme based on an adaptive CQI threshold is developed. …”
Get full text
Get full text
Thesis -
8
-
9
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
10
-
11
Data hiding mobile application by using encryption and decryption / Nuha Bakizah Mohd Asri
Published 2021“…Encryption and decryption are used for image-based authentication here. Encode is mainly achieved by changing the message into other code that any third-party will not understand, one with the database of the user and one with the database of the server. …”
Get full text
Get full text
Student Project -
12
802.11 MAC layer sniffer using spoof detection algorithm / Azwan Abdul Satar
Published 2007“…The wireless sniffer implements sequence number-based spoofing detection algorithm in its processing. …”
Get full text
Get full text
Thesis -
13
Bidirectional detection method using for hall effects sensors for water flow measurement system
Published 2014“…Lastly, a measurement and monitoring algorithm is developed based on Labview to calculate the flow rate, water consumption and detect the error source and flow direction. …”
Get full text
Get full text
Thesis -
14
-
15
-
16
Modified strut-and-tie models for reinforced concrete deep beams with externally bonded CFRP systems
Published 2017“…The optimum proposed model was built based on the data collected from existing experimental programs and the proposed finite element models. …”
Get full text
Get full text
Get full text
Thesis
