Search Results - (( evolution application cell algorithm ) OR ( java application during algorithm ))
Search alternatives:
- evolution application »
- application during »
- application cell »
- java application »
- during algorithm »
- cell algorithm »
-
1
Performance evaluation of relay deployment in long term evolution advanced (LTE-A) network / Aminah Najihah Jaafar
Published 2014“…To support a high data services and applications it is required a peak data rate. The enhancement of the cell-edge capacity as well as cell coverage are the expectation that can be provided by Long Term Evolution Advanced (LTE-A). …”
Get full text
Get full text
Article -
2
Performance evaluation of relay deployment in Long Term Evolution Advanced (LTE-A) network / Aminah Najihah Jaafar
Published 2016“…To support a high data services and applications it is required a peak data rate. The enhancement of the cell-edge capacity as well as cell coverage are the expectation that can be provided by Long Term Evolution Advanced (LTE-A). …”
Get full text
Get full text
Thesis -
3
Mobility management schemes based on multiple criteria for optimization of seamless handover in long term evolution networks
Published 2014“…The conventional cell selection in LTE uses S-criterion only, which is inefficient. …”
Get full text
Get full text
Thesis -
4
The evolution and trend of chain code scheme
Published 2008Get full text
Get full text
Get full text
Article -
5
Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff
Published 2017“…In terms of number of users in the cell, the algorithm could achieve up to 240% of maximum throughput, 61% reduction in ECR and 150% improvement in EE. …”
Get full text
Get full text
Thesis -
6
-
7
Performance analysis of uplink scheduling algorithms in the urban and rural environments in LTE / Shafinaz Ismail, Darmawaty Mohd Ali and Norsuzlia Ya'acob
Published 2018“…Long Term Evolution (LTE) is the evolution of an existing 3G mobile network towards a higher capacity, a lower latency and a more efficient core network and radio access. …”
Get full text
Get full text
Get full text
Article -
8
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
9
-
10
Parameter extraction of solar photovoltaic modules using penalty-based differential evolution
Published 2012“…The two diode model of a solar cell is used as the basis for the extraction problem. …”
Get full text
Get full text
Article -
11
Optimization of chemotherapy using metaheuristic optimization algorithms / Prakas Gopal Samy
Published 2024“…The HM emerges as a dominant strategy, driven by the Multi-Objective Differential Evolution (MODE) algorithm under literature-based control parameter settings for the mathematical model. …”
Get full text
Get full text
Get full text
Thesis -
12
Quality of service and scheduling performance optimization in LTE networks / Abubakar Auwal Idris
Published 2017“…Long Term Evolution (LTE) is a technology introduced by Third Generation Partnership Project (3GPP) specification to transmit high data rate and increases applications requirements with reliable and best connection. …”
Get full text
Get full text
Get full text
Thesis -
13
-
14
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
15
Enhancing the QoS performance for mobile station over LTE and WiMAX networks / Mhd Nour Hindia
Published 2015“…On the second level, TOPSIS algorithm allocates resources among an application’s user based on their criteria and the application’s preferences. …”
Get full text
Get full text
Thesis -
16
-
17
-
18
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
19
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis -
20
