Search Results - (( based coding growth algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 16 results of 16
Refine Results
  1. 1

    Energy-driven scheduling for Digital Video Broadcasting - Satellite Second Generation (DVB-S2) by Thian, Laah Lean, Al-Saegh, Ali Mohammed, Ramli, K. F., Ibrahim, N. S., Sali, Aduwati, Salman, Mustafa Ismael

    Published 2013
    “…Based on energy efficiency of each modulation and coding scheme (MODCOD) available in Digital Video Broadcasting - Satellite Second Generation (DVB-S2), the EEF algorithm improves a scheduling mechanism of a two-step scheduler by selecting frames to be transmitted next according to “energy efficiency” policy developed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2
  3. 3

    Recent advances of whale optimization algorithm, its versions and applications by Alyasseri Z.A.A., Ali N.S., Al-Betar M.A., Makhadmeh S.N., Jamil N., Awadallah M.A., Braik M., Mirjalili S.

    Published 2024
    “…One of the SI algorithms is called the whale optimization algorithm (WOA). …”
    Book chapter
  4. 4
  5. 5

    An FPGA implementation of Alamouti's transmit diversity technique by Mukilan, Pushpamalar

    Published 2008
    “…However, there are limits to growth, and the radio spectrum used for wireless communications is a finite resource. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A Bat-inspired Strategy for Pairwise Testing by Alsariera, Yazan A., Mazlina, Abdul Majid, Kamal Z., Zamli

    Published 2015
    “…Owing to exponential growth of software lines of codes (LOC)s, testing becomes painstakingly difficult activities. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

    Data hiding mobile application by using encryption and decryption / Nuha Bakizah Mohd Asri by Mohd Asri, Nuha Bakizah

    Published 2021
    “…Encryption and decryption are used for image-based authentication here. Encode is mainly achieved by changing the message into other code that any third-party will not understand, one with the database of the user and one with the database of the server. …”
    Get full text
    Get full text
    Student Project
  12. 12

    802.11 MAC layer sniffer using spoof detection algorithm / Azwan Abdul Satar by Abdul Satar, Azwan

    Published 2007
    “…The wireless sniffer implements sequence number-based spoofing detection algorithm in its processing. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Bidirectional detection method using for hall effects sensors for water flow measurement system by Garmabdari, Rasoul

    Published 2014
    “…Lastly, a measurement and monitoring algorithm is developed based on Labview to calculate the flow rate, water consumption and detect the error source and flow direction. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Modified strut-and-tie models for reinforced concrete deep beams with externally bonded CFRP systems by Hanoon, Ammar Nasiri

    Published 2017
    “…The optimum proposed model was built based on the data collected from existing experimental programs and the proposed finite element models. …”
    Get full text
    Get full text
    Get full text
    Thesis