Search Results - (( user evaluation cell algorithm ) OR ( java application using algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Backhaul load and performance optimality of partial joint processing schemes in LTE-A networks by Kousha, Mohammad

    Published 2014
    “…However, the problem of performance degradation caused by InterCell-Interference (ICI) also raised for cell-edge users. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Quality of service and scheduling performance optimization in LTE networks / Abubakar Auwal Idris by Abubakar Auwal , Idris

    Published 2017
    “…The future work will consider to simulate multi cell scenario and the system complexity evaluation. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7

    Performance evaluation of LTE scheduling techniques for heterogeneous traffic and different mobility scenarios by Sukeran, Lukmanhakim, Habaebi, Mohamed Hadi, Zyou, Al-Hareth, Ahmed, Musse Mohamud, Hameed, Shihab A, Azman, Amelia Wong, Islam, Md Rafiqul

    Published 2015
    “…In this paper five scheduling algorithms were investigated and their performance was evaluated in terms of Fairness Index, Peak Throughput, Average Throughput and Edge Cell User Throughput. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Performance evaluation of LTE scheduling techniques for heterogeneous traffic and different mobility scenarios by Sukeran, Lukmanhakim, Habaebi, Mohamed Hadi, Zyoud, Al-Hareth, Musse, Mohamud Ahmed, Hameed, Shihab A., Azman, Amelia Wong, Islam, Md. Rafiqul

    Published 2014
    “…In this paper five scheduling algorithms were investigated and their performance was evaluated in terms of Fairness Index, Peak Throughput, Average Throughput and Edge Cell User Throughput. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10
  11. 11

    A new dynamic code assignment algorithm for joint CDMA and SDMA system by Odeh, Nidhal A. S., Khatun, Sabira, Ismail, Alyani, Mohd Ali, Borhanuddin

    Published 2008
    “…The probability of blocking is calculated to evaluate the system performance for different number of users and available codes. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13
  14. 14

    Diagnosis of eyesight using Improved Clonal Selection Algorithm (ICLONALG) / Nor Khirda Masri by Masri, Nor Khirda

    Published 2017
    “…The principle of ICLONALG is to select the best cells to be cloned and mutated by calculating similarity measurements of the most competent cells. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16
  17. 17
  18. 18

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20