Search Results - (( evolution application cell algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- evolution application »
- application testing »
- testing algorithm »
- application cell »
- java application »
- cell algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
Performance evaluation of relay deployment in long term evolution advanced (LTE-A) network / Aminah Najihah Jaafar
Published 2014“…To support a high data services and applications it is required a peak data rate. The enhancement of the cell-edge capacity as well as cell coverage are the expectation that can be provided by Long Term Evolution Advanced (LTE-A). …”
Get full text
Get full text
Article -
3
Performance evaluation of relay deployment in Long Term Evolution Advanced (LTE-A) network / Aminah Najihah Jaafar
Published 2016“…To support a high data services and applications it is required a peak data rate. The enhancement of the cell-edge capacity as well as cell coverage are the expectation that can be provided by Long Term Evolution Advanced (LTE-A). …”
Get full text
Get full text
Thesis -
4
Mobility management schemes based on multiple criteria for optimization of seamless handover in long term evolution networks
Published 2014“…The conventional cell selection in LTE uses S-criterion only, which is inefficient. …”
Get full text
Get full text
Thesis -
5
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
6
The evolution and trend of chain code scheme
Published 2008Get full text
Get full text
Get full text
Article -
7
Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff
Published 2017“…In terms of number of users in the cell, the algorithm could achieve up to 240% of maximum throughput, 61% reduction in ECR and 150% improvement in EE. …”
Get full text
Get full text
Thesis -
8
-
9
-
10
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
11
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
12
Performance analysis of uplink scheduling algorithms in the urban and rural environments in LTE / Shafinaz Ismail, Darmawaty Mohd Ali and Norsuzlia Ya'acob
Published 2018“…Long Term Evolution (LTE) is the evolution of an existing 3G mobile network towards a higher capacity, a lower latency and a more efficient core network and radio access. …”
Get full text
Get full text
Get full text
Article -
13
-
14
-
15
-
16
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
17
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
18
Parameter extraction of solar photovoltaic modules using penalty-based differential evolution
Published 2012“…The two diode model of a solar cell is used as the basis for the extraction problem. …”
Get full text
Get full text
Article -
19
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
20
Optimization of chemotherapy using metaheuristic optimization algorithms / Prakas Gopal Samy
Published 2024“…The HM emerges as a dominant strategy, driven by the Multi-Objective Differential Evolution (MODE) algorithm under literature-based control parameter settings for the mathematical model. …”
Get full text
Get full text
Get full text
Thesis
