Search Results - (( evolution application cell algorithm ) OR ( java applications using algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Performance evaluation of relay deployment in long term evolution advanced (LTE-A) network / Aminah Najihah Jaafar by Hasanudin, Siti Farhana

    Published 2014
    “…To support a high data services and applications it is required a peak data rate. The enhancement of the cell-edge capacity as well as cell coverage are the expectation that can be provided by Long Term Evolution Advanced (LTE-A). …”
    Get full text
    Get full text
    Article
  3. 3
  4. 4
  5. 5

    Performance evaluation of relay deployment in Long Term Evolution Advanced (LTE-A) network / Aminah Najihah Jaafar by Jaafar, Aminah Najihah

    Published 2016
    “…To support a high data services and applications it is required a peak data rate. The enhancement of the cell-edge capacity as well as cell coverage are the expectation that can be provided by Long Term Evolution Advanced (LTE-A). …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff by Mohd Yusoff, Nurulanis

    Published 2017
    “…In terms of number of users in the cell, the algorithm could achieve up to 240% of maximum throughput, 61% reduction in ECR and 150% improvement in EE. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14
  15. 15

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16
  17. 17

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…The method used to develop this project is Rapid Application Development (RAD). …”
    Get full text
    Get full text
    Final Year Project
  18. 18

    Performance analysis of uplink scheduling algorithms in the urban and rural environments in LTE / Shafinaz Ismail, Darmawaty Mohd Ali and Norsuzlia Ya'acob by Ismail, Shafinaz, Mohd Ali, Darmawaty, Ya'acob, Norsuzlia

    Published 2018
    “…Long Term Evolution (LTE) is the evolution of an existing 3G mobile network towards a higher capacity, a lower latency and a more efficient core network and radio access. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…Diffie-Hellman algorithm is used to determine the pixel on an image that will be used to store the message. …”
    Get full text
    Get full text
    Conference or Workshop Item