Search Results - (( technology implementation cell algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- implementation cell »
- java application »
- cell algorithm »
-
1
-
2
-
3
-
4
Efficient radio resource allocation scheme for 5G networks with device-to-device communication
Published 2024journal::journal article -
5
-
6
Cloud co-residency denial of service threat detection inspired by artificial immune system
Published 2024journal::journal article -
7
-
8
-
9
Dynamic Feedback Flow Control Algorithms for Unicast and Multicast Available Bit Rate Service in Asynchronous Transfer Mode Networks
Published 2000“…Thirdly, the design and implementation issues have been addressed together with the major drawbacks of the previous schemes and hence two algorithms have been proposed. …”
Get full text
Get full text
Thesis -
10
-
11
Penyelarasan gangguan antara sel dalam komunikasi tanpa wayar
Published 2024“…The introduction of wireless communication technology brought great changes in our lives. Although there are limiting factors, techniques such as NetMIMO and DFFR help reduce interference between cells. …”
Get full text
Get full text
Book -
12
Fault detection with optimum March test algorithm
Published 2013Get full text
Get full text
Get full text
Article -
13
Low Power Standard Cell Library Design For Application Specific Integrated Circuit
Published 2002“…This requires chip designers to minimize power consumption at all design level such as system, algorithm, architecture, circuit and technology. The objective of this work is to develop low power CMOS standard cell library to be used in application specific integrated circuit (ASIC) design flow. …”
Get full text
Get full text
Thesis -
14
Efficient radio resource management through coordinated multipoint transmission and carrier aggregation for LTE-advanced / Muhammad Hasibur Rashid Chayon
Published 2018“…However, poor received signal and interference from adjacent cells in the cell-edge area can reduce the efficiency of using the individual technology. …”
Get full text
Get full text
Get full text
Thesis -
15
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Published 2017“…Among all of the cryptography measures, Secure Hash Algorithm 3 (SHA-3) is the newest and secure cryptographic hash algorithm in the current electronic industry. …”
Get full text
Get full text
Thesis -
16
Cloudids: Cloud Intrusion Detection Model Inspired By Dendritic Cell Mechanism
Published 2024“…The experiments show that the Cloud IDS model based on Dendritic Cell algorithm able to identify and detect novel threat that targeting Cloud environment.…”
Article -
17
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
18
An efficient cache replacement algorithm for minimizing the error rate in L2-STT-MRAM caches
Published 2017“…The performance analysis of the proposed algorithm ensures its effectiveness in reducing the error rate and cost overheads as compared to the conventional LRU technique implemented on SRAM cells.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
Performance analyses of adaptive handover decision algorithm using spectrum aggregation in long term evolution - advanced network
Published 2021“…The aspect of spectrum or carrier aggregation uses cognitive radio technology that implements the dynamic spectrum access for spectrum utilization by sensing and using the underutilized spectrum on co-primary basis without interference to the primary users. …”
Get full text
Get full text
Conference or Workshop Item -
20
Security system using biometric technology: Design and implementation of voice recognition system (VRS)
Published 2008“…The technology lends itself well to a variety of uses and applications, including security access control for cell phones (to eliminate cell phone fraud), ATM manufacturers (to eliminate pin # fraud) and automobile manufacturers (to dramatically reduce theft and carjacking). …”
Get full text
Get full text
Get full text
Conference or Workshop Item
