Search Results - (( code application max algorithm ) OR ( java application during algorithm ))
Search alternatives:
- application during »
- code application »
- java application »
- during algorithm »
- application max »
- max algorithm »
-
1
An event-driven simulation for highest urgency first (HUF) : a latency and modulation aware bandwidth allocation algorithm for WiMAX base stations.
Published 2013“…To strike an ideal balance in gauging these trade-offs and to further complement the repository of simulators, this paper presents the details of a general-purpose programming language based discrete event simulation for WiMAX. This research has focused at developing a discrete-event simulator to implement bandwidth allocation algorithms for a WiMAX base station.The highest urgency first algorithm has been utilized as a benchmark deployment algorithm in order to provide: dynamic downlink/uplink adjustment and latency guarantee for real-time applications. …”
Get full text
Get full text
Article -
2
Digital beamforming implementation of switch-beam smart antenna system by using integrated digital signal processor and field-programmable gate array
Published 2008“…The application targeted for this research is WiMax. Regardless of the application, hardware implementation of smart antenna is very challenging and complicated. …”
Get full text
Get full text
Thesis -
3
-
4
Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture
Published 2010“…Finally, the performance of V-BLAST/STBC transceiver scheme with proposed LC-QR algorithm is compared with other MIMO systems, such as V-BLAST and orthogonal space-time block codes. …”
Get full text
Get full text
Thesis -
5
-
6
-
7
FPGA Implementation of Emergency Door Car Entry System
Published 2008“…FPGA board is a board that can be programmed using source code to run the application that has been downloaded into it. …”
Get full text
Learning Object -
8
Fractal coding of bio-metric image for face authentication
Published 2021“…This thesis implements the algorithms for the Methods of CPM, BPBM fractal coding, and its application. …”
Get full text
Get full text
Thesis -
9
Competitive improvement of the time complexity to encode fractal image: by applying symmetric central pixel of the block
Published 2021“…As a consequence, the symmetrical CP of odd pixels block, reduction of block space, and edge pixel selection accomplished faster coding and competitive image quality than existing known exhaustive search algorithms.…”
Get full text
Get full text
Article -
10
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
11
Design of an OFDM transmitter and receiver using FPGA
Published 2004Get full text
Get full text
Thesis -
12
-
13
Antenna design using left-handed materials
Published 2008“…After modeling, the algorithm is implemented in DSP by using C and Code Composer Studio. …”
Get full text
Get full text
Get full text
Monograph -
14
-
15
Antenna design using left-handed materials
Published 2008“…After modeling, the algorithm is implemented in DSP by using C and Code Composer Studio. …”
Get full text
Get full text
Get full text
Monograph -
16
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
17
-
18
-
19
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
20
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis
