Search Results - (( based integrated multimedia algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    Development of the Multipurpose Integrated Multimedia Presentation System Based on the CCM Algorithm by Asnawi, Rustam, Wan Ahmad, Wan Fatimah, A. Rambli, Dayang R.

    Published 2010
    “…Nevertheless commonly people use a different application for presenting those each multimedia element files type. This paper describes a multipurpose integrated multimedia presentation system (IMPS) based on channel controller model (CCM) algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Resource Allocation and Mobility Prediction Algorithms for Multimedia Wireless Cellular Networks by Al-Sanabani, Maher Ali

    Published 2008
    “…The third proposed framework is an integration of the AMCSC scheme and the bandwidth reservation done based on the MPS. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Integrating Interactive Multimedia Objects in Mobile Augmented Reality for Sarawak Tourism by Lee, Angeline, Ng, Edmund Giap Weng, Tan, Kuan Yin., Siti Shukhaila, Shaharuddin, Syaryfah Fazidawaty, Wan Busrah

    Published 2018
    “…Whereas, audio and video API for Android platform were used to build multimedia based audio and video module. As for interaction module, technique of color picking algorithm was applied. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    WCDMA teletraffic performance improvement via power resource optimization using distributed parallel genetic algorithm by Prajindra S.K., Tiong S.K., Johnny Koh S.P., Yap D.F.W.

    Published 2023
    “…The algorithm works by finding the minimum transmitter power with the help of Distributed Parallel Genetic Algorithm (DPGA) employed on an offload microcontroller system to form optimal beam coverage to reduce power usage of adaptive antenna at WCDMA base station. …”
    Conference paper
  5. 5

    Adaptive Quality Of Service Call Admission Control With User Mobility Prediction For Multimedia Traffic Over Wireless Networks by Prihandoko

    Published 2003
    “…The proposed user mobility prediction algorithm integrates the Received Signal Strength (RSS) measurements for the mobile terminal's intra-cell movement and aggregate history of mobile terminals for inter-cell movement. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Design and development of the network interface, packets scheduling and interference mitigation schemes for LTE-based femtocell networks / Sinan Ghassan Abid Ali by Ali, Sinan Ghassan Abid

    Published 2016
    “…The proposed RBP scheduling algorithm outperforms the well-known scheduling algorithms in terms of a lower PLR among users in the LTE based femtocell network. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Asynchronous transfer mode (ATM) real-time applications / Reidzuan Ahmad by Ahmad, Reidzuan

    Published 1997
    “…There are many applications that needs a real-time control systems and one of it is a multimedia applications which is integrated of all types of message transmissions. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    WA VELET-DCT BASED IMAGE CODER FOR VIDEO CODING APPLICATIONS by GANI, REGINA

    Published 2008
    “…This process is also known as thresholding. The Wavelet-DCT algorithm is integrated into a simulation of intra-frame coder in compliance with MPEG-2 standard. …”
    Get full text
    Get full text
    Final Year Project
  10. 10
  11. 11
  12. 12
  13. 13

    Mobile technology generations and cryptographic algorithms: analysis study by Jassim, Khalid Fadhil, Alshaikhli, Imad Fakhri Taha

    Published 2016
    “…Therefore, some cryptographic algorithms have proposed as confidentiality and integrity algorithms in different mobile generations, in order to prevent or mitigate these harmful operations. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14
  15. 15

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18
  19. 19

    Performance analysis of downlink scheduling in 3GPP LTE system / Muhammad Haikal Hashim by Hashim, Muhammad Haikal

    Published 2014
    “…The Round Robin, Best CQI and Proportional Fair scheduling algorithm have been considered in this report. All the implementation, analysis and comparison of these scheduling algorithms were done through simulations executed on a MATLAB-based downlink link level simulator, Vienna LTE Simulator…”
    Get full text
    Get full text
    Thesis
  20. 20

    Bridging Mayer’s cognitive theory of multimedia learning and computational thinking in tackling the cognitive load issues among young digital natives : a conceptual framework by Wan Nor Ashiqin Wan Ali, Wan Ahmad Jaafar Wan Yahaya

    Published 2022
    “…CT refers to the capacity of learners to systematically tackle unstructured tasks focused on four computing concepts such as decomposition, abstraction, pattern recognition, and algorithmic thinking. The purpose of this paper is to study the relationship between CT and Mayer’s Cognitive Theory of Multimedia Learning (CTML) on the cognitive load of the learners. …”
    Get full text
    Get full text
    Get full text
    Article