Search Results - (( evolution communication devices algorithm ) OR ( java implementation path algorithm ))
Search alternatives:
- evolution communication »
- communication devices »
- java implementation »
- implementation path »
- devices algorithm »
- path algorithm »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
A modified group authentication scheme for machine type communication in LTE/LTE-a networks
Published 2018“…Meeting the necessities of control usage of devices and mass implement transmission is a key issue in the implementation of MTC in the Long Term Evolution/Long Term Evolution Advanced systems. …”
Get full text
Get full text
Thesis -
3
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
4
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Packet scheduling algorithms for long term evolution
Published 2011Get full text
Get full text
Get full text
Book Chapter -
6
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
7
-
8
Comparison of ECC and RSA algorithms in IOT devices
Published 2019“…Understanding and comparing algorithms implemented in IoT devices, regarding performance discussed in this paper. …”
Get full text
Get full text
Article -
9
Delay-Aware Energy-Efficient Joint Power Control and Mode Selection in Device-to-Device Communications for FREEDM Systems in Smart Grids
Published 2024“…The Device-to-device (D2D) communications are proposed as critical solutions to enhance the performance of the LTE. …”
Article -
10
CONTEXT AWARE TRAFFIC SCHEDULING ALGORITHM FOR COMMUNICATION SYSTEM IN POWER DISTRIBUTION NETWORK
Published 2023“…Smart grid is an evolution from conventional power grid in which power communication system has migrated from one-way to bi-directional communication network. …”
text::Thesis -
11
Performance analysis of downlink scheduling in 3GPP LTE system / Muhammad Haikal Hashim
Published 2014“…In coming years, LTE technology will be widely used by people on their devices such as notebooks, smartphones, gaming devices and video cameras. …”
Get full text
Get full text
Thesis -
12
Mobility management schemes based on multiple criteria for optimization of seamless handover in long term evolution networks
Published 2014“…The tremendous growth of mobile devices and their attendant applications demand for wireless communication networks supporting high data rates with large capacity. …”
Get full text
Get full text
Thesis -
13
Bridging the gap: technological innovations and sustainability towards transforming disability products / Norida Abu Bakar … [et al.]
Published 2024“…From smart prosthetics equipped with sensor arrays and AI algorithms to wearable devices integrating biofeedback mechanisms, the landscape of assistive technology is undergoing a remarkable evolution. …”
Get full text
Get full text
Get full text
Book Section -
14
A secure trust aware ACO-Based WSN routing protocol for IoT
Published 2022“…The popularization of IoT-connected devices facilitating evolution of IoT applications does come with security challenges. …”
Get full text
Get full text
Get full text
Article -
15
iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems
Published 2024“…For this intelligent TMM, a variant of Frequency Pattern Growth (FP-Growth), called enhanced FP-Growth (EFP-Growth) algorithm is developed by altering the internal data structures for faster execution and by developing a modified exponential decay function (MEDF) to automatically calculate minimum supports for adapting trust evolution characteristics. …”
Get full text
Get full text
Get full text
Article -
16
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
17
A complexity-reduced digital predistortion for radio frequency power amplifier
Published 2016“…Power amplifier (PA) is a major source of nonlinearity in a communication system since it often has to operate close to the saturation region to achieve high power efficiency. …”
Get full text
Get full text
Thesis
