Search Results - (( developing mobile max algorithm ) OR ( java application using algorithm ))
Search alternatives:
- java application »
- using algorithm »
- max algorithm »
- mobile max »
-
1
Impact of multiplay transmission in mobile WIMAX using overlay scanning: article / Akmarya Syukhairilnisah Mohd Akhir
Published 2014“…This research proposed performance analysis of WiMAX/IEEE 802.16 with mobility supported, scan the channels provided by the mobile station. …”
Get full text
Get full text
Article -
2
Impact of multiplay transmission in mobile WIMAX using overlay scanning / Akmarya Syukhairilnisah Mohd Akhir
Published 2014“…This research proposed performance analysis of WiMAX/IEEE802.16 with mobility supported, scan the channels provided by the mobile station. …”
Get full text
Get full text
Thesis -
3
Quality of service management algorithms in WiMAX networks
Published 2015“…Simulation have been extensively used to evaluate the proposed algorithm. Finally, Discrete Event Simulator (DES) is designed and developed in order to evaluate the performance of the proposed algorithms. …”
Get full text
Get full text
Thesis -
4
Improved Location And Positioning Utilizing Single MIMO Base Station In IMT-Advanced System
Published 2016“…This paper discusses an improvement of location and positioning estimation using one of the IMT-Advanced systems known as the mobile WiMAX. The Single MIMO Base Station (SMBS) in mobile WiMAX is combined with a virtual technique, known as the Virtual Base Stations, created a novel algorithm for location and positioning (L&P) purposes. …”
Get full text
Get full text
Get full text
Article -
5
Optimized scheme for efficient and scalable key management in IEEE 802.16e-based networks
Published 2015“…Subsequently, Mobile WiMAX was developed based on IEEE802.16e to support mobility where mobile devices can then roam from one coverage area to the next and remain connected. …”
Get full text
Get full text
Thesis -
6
Simulation model to improve QoS performance over fixed WiMAX using OPNET
Published 2013“…A Model was developed based on the proposed new distributed model (Master-Slave), the first scenario comprised of 3 Base Stations (BS) and thirty Subscriber Station (SS) with one Master BS selected by the designed algorithm (Nearest Neighborhood Algorithms). …”
Get full text
Get full text
Article -
7
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
8
-
9
-
10
-
11
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
12
A new model of application response time for VoIP over WLAN and fixed WiMAX
Published 2015“…Worldwide Interoperability for Microwave Access (WiMAX) technology is also a preliminary step to develop Fourth Generation networks (4G) technologies. …”
Get full text
Get full text
Conference or Workshop Item -
13
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…The fourth stage is to design evaluation methodology of Max-Min Rule-Based Classification Algorithm using classifier model. …”
Get full text
Get full text
Thesis -
14
Vertical Handover Decision Processes for Fourth Generation Heterogeneous Wireless Networks
Published 2013“…IEEE 802.11 WLANs, IEEE 802.16 WiMAX, satellite systems, bluetooth, etc. in addition to the traditional cellular telephony networks]. …”
Get full text
Get full text
Get full text
Article -
15
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
17
-
18
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Performance Analysis of Routing Protocols in Resource-Constrained Opportunistic Networks
Published 2019“…Recently, opportunistic networks are considered as one of the most attractive developments of ad hoc mobile networks (MANETs) that have emerged thanks to the development of intelligent devices. …”
Get full text
Get full text
Get full text
Article -
20
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item
