Search Results - (( evolution application cell algorithm ) OR ( java application during algorithm ))

Refine Results
  1. 1

    Performance evaluation of relay deployment in long term evolution advanced (LTE-A) network / Aminah Najihah Jaafar by Hasanudin, Siti Farhana

    Published 2014
    “…To support a high data services and applications it is required a peak data rate. The enhancement of the cell-edge capacity as well as cell coverage are the expectation that can be provided by Long Term Evolution Advanced (LTE-A). …”
    Get full text
    Get full text
    Article
  2. 2

    Performance evaluation of relay deployment in Long Term Evolution Advanced (LTE-A) network / Aminah Najihah Jaafar by Jaafar, Aminah Najihah

    Published 2016
    “…To support a high data services and applications it is required a peak data rate. The enhancement of the cell-edge capacity as well as cell coverage are the expectation that can be provided by Long Term Evolution Advanced (LTE-A). …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5

    Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff by Mohd Yusoff, Nurulanis

    Published 2017
    “…In terms of number of users in the cell, the algorithm could achieve up to 240% of maximum throughput, 61% reduction in ECR and 150% improvement in EE. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Performance analysis of uplink scheduling algorithms in the urban and rural environments in LTE / Shafinaz Ismail, Darmawaty Mohd Ali and Norsuzlia Ya'acob by Ismail, Shafinaz, Mohd Ali, Darmawaty, Ya'acob, Norsuzlia

    Published 2018
    “…Long Term Evolution (LTE) is the evolution of an existing 3G mobile network towards a higher capacity, a lower latency and a more efficient core network and radio access. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  9. 9
  10. 10

    Parameter extraction of solar photovoltaic modules using penalty-based differential evolution by Ishaque, K., Salam, Z., Mekhilef, Saad, Shamsudin, A.

    Published 2012
    “…The two diode model of a solar cell is used as the basis for the extraction problem. …”
    Get full text
    Get full text
    Article
  11. 11

    Optimization of chemotherapy using metaheuristic optimization algorithms / Prakas Gopal Samy by Prakas Gopal , Samy

    Published 2024
    “…The HM emerges as a dominant strategy, driven by the Multi-Objective Differential Evolution (MODE) algorithm under literature-based control parameter settings for the mathematical model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Quality of service and scheduling performance optimization in LTE networks / Abubakar Auwal Idris by Abubakar Auwal , Idris

    Published 2017
    “…Long Term Evolution (LTE) is a technology introduced by Third Generation Partnership Project (3GPP) specification to transmit high data rate and increases applications requirements with reliable and best connection. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  15. 15

    Enhancing the QoS performance for mobile station over LTE and WiMAX networks / Mhd Nour Hindia by Hindia, Mhd Nour

    Published 2015
    “…On the second level, TOPSIS algorithm allocates resources among an application’s user based on their criteria and the application’s preferences. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
    Get full text
    Get full text
    Thesis
  20. 20