Search Results - (( effective communication techniques algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- communication techniques »
- implication based »
- java implication »
-
1
-
2
Modem Recognition Algorithm for Software Defined Radio Base Station
Published 2004“…The proposed algorithm was developed based on 8th order statistical moment and the technique was chosen based on the research work done by Keith et al [15]. …”
Get full text
Get full text
Thesis -
3
Performance of MIMO space-time coded system and training based channel estimation for MIMO-OFDM system
Published 2006“…At the next stage of the project, the effect of channel estimation algorithm on performance of MIMO-OFDM system was investigated. …”
Get full text
Get full text
Thesis -
4
Enhanced PAPR reduction and channel estimation techniques in multi-carrier wireless communication system
Published 2016“…However, OFDM and MC-CDMA still suffer from peak to average power ratio (PAPR), which is a major drawback in most multi-carrier communications systems. In addition, channel estimation plays a very important role in overcoming the effect of channel fading, which causes BER degradation and jamming pilot symbols. …”
Get full text
Get full text
Thesis -
5
Performance evaluation of multi-user detection in Cdma using micro-genetic algorithm
Published 2005“…Two main problem of multi-user communication system are the Multiple Access Interference (MAI) and the near-far effects. …”
Get full text
Get full text
Get full text
Proceeding Paper -
6
-
7
-
8
Performance evaluation of compression techniques on scientific dataset / Lam Wai Leong
Published 2006“…This project looks into various data compression technique and when to use them, with specifically focus on ii evaluating the performance of existing data compression and extraction algorithms that best suit scientific dataset. …”
Get full text
Get full text
Thesis -
9
-
10
-
11
Algorithm As A Problem Solving Technique For Teaching And Learning Of The Malay Language
Published 2019“…Students are also excited about the algorithmic techniques and the scratch program generated. …”
Get full text
Get full text
Get full text
Article -
12
A Distributed Energy Aware Connected Dominating Set Technique for Wireless Sensor Networks
Published 2012Get full text
Get full text
Conference or Workshop Item -
13
Algorithm as a problem solving technique for teaching and learning of the Malay language
Published 2019“…Students are also excited about the algorithmic techniques and the scratch program generated. …”
Get full text
Get full text
Get full text
Article -
14
Self-Schedule and Self-Distributive MAC Scheduling Algorithms for Next-Generation Sensor Networks
Published 2015“…The proposed algorithms do not require any synchronization and can effectively adapt to dynamic topology changes without incurring global communication overhead. …”
Get full text
Get full text
Article -
15
-
16
Design and implementation of multimedia digital matrix system
Published 2005“…The essential of multimedia support in M-DMS is high-speed digital interfacing technique. In this case, back plane communication technique has been changed from parallel architecture to serial. …”
Get full text
Get full text
Conference or Workshop Item -
17
Crosstalk-Free Scheduling Algorithms for Routing in Optical Multistage Interconnection Networks
Published 2009“…Then, the Fast Zero (FastZ) algorithm is proposed, which uses a new concept called the symmetric Conflict Matrix (sCM) as a pre-scheduling technique. …”
Get full text
Get full text
Thesis -
18
Adaptive array antenna design for wireless communication systems
Published 2013“…This thesis presents techniques for the design of adaptive array antennas which will enable their cost effective implementation in wireless communication systems. …”
Get full text
Get full text
Thesis -
19
-
20
Mathematical modelling on communication between two parties / Nor Anees Asyiqin Md Disa, Khairunnisa Munawarah Khairul Anwar and Aniesa Farhana Mazlan
Published 2022“…Elliptic Curve Cryptography (ECC) is a key-based technique for encrypting data. A key pair where the private and public keys is often used by an individual in public key cryptography communication procedures to operate the cryptographic system. …”
Get full text
Get full text
Student Project
