Search Results - (( technology implementation cell algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9

    Dynamic Feedback Flow Control Algorithms for Unicast and Multicast Available Bit Rate Service in Asynchronous Transfer Mode Networks by Abdelrahman, Ali Mohamed

    Published 2000
    “…Thirdly, the design and implementation issues have been addressed together with the major drawbacks of the previous schemes and hence two algorithms have been proposed. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Penyelarasan gangguan antara sel dalam komunikasi tanpa wayar by Mohd Kasim, Noor Shahida

    Published 2024
    “…The introduction of wireless communication technology brought great changes in our lives. Although there are limiting factors, techniques such as NetMIMO and DFFR help reduce interference between cells. …”
    Get full text
    Get full text
    Book
  12. 12
  13. 13

    Low Power Standard Cell Library Design For Application Specific Integrated Circuit by Jambek, Asral Bahari

    Published 2002
    “…This requires chip designers to minimize power consumption at all design level such as system, algorithm, architecture, circuit and technology. The objective of this work is to develop low power CMOS standard cell library to be used in application specific integrated circuit (ASIC) design flow. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Efficient radio resource management through coordinated multipoint transmission and carrier aggregation for LTE-advanced / Muhammad Hasibur Rashid Chayon by Muhammad Hasibur, Rashid Chayon

    Published 2018
    “…However, poor received signal and interference from adjacent cells in the cell-edge area can reduce the efficiency of using the individual technology. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area by Lim , Yen Ruen

    Published 2017
    “…Among all of the cryptography measures, Secure Hash Algorithm 3 (SHA-3) is the newest and secure cryptographic hash algorithm in the current electronic industry. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Cloudids: Cloud Intrusion Detection Model Inspired By Dendritic Cell Mechanism by Azuan Ahmad, Norbik Bashah Idris, Mohd Nazri Kama

    Published 2024
    “…The experiments show that the Cloud IDS model based on Dendritic Cell algorithm able to identify and detect novel threat that targeting Cloud environment.…”
    Article
  17. 17

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  18. 18

    An efficient cache replacement algorithm for minimizing the error rate in L2-STT-MRAM caches by Olanrewaju, Rashidah Funke, Asifa Mehraj Baba, Asifa Mehraj, Khan, Burhan Ul Islam, Yaacob, Mashkuri, Azman, Amelia Wong, Mir, Mohammad Shuaib

    Published 2017
    “…The performance analysis of the proposed algorithm ensures its effectiveness in reducing the error rate and cost overheads as compared to the conventional LRU technique implemented on SRAM cells.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    Performance analyses of adaptive handover decision algorithm using spectrum aggregation in long term evolution - advanced network by Usman, I. H., Nordin, N. K., Omizegba, E. E., Sali, A., Rasid, M. F. A., Hashim, F.

    Published 2021
    “…The aspect of spectrum or carrier aggregation uses cognitive radio technology that implements the dynamic spectrum access for spectrum utilization by sensing and using the underutilized spectrum on co-primary basis without interference to the primary users. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Security system using biometric technology: Design and implementation of voice recognition system (VRS) by A. Rashid, Rozeha, Mahalin, Nur Hija, Sarijari, Mohd. Adib, Abdul Aziz, Ahmad Aizuddin

    Published 2008
    “…The technology lends itself well to a variety of uses and applications, including security access control for cell phones (to eliminate cell phone fraud), ATM manufacturers (to eliminate pin # fraud) and automobile manufacturers (to dramatically reduce theft and carjacking). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item