Search Results - (( using optimization method algorithm ) OR ( user computing cell algorithm ))*
Search alternatives:
- method algorithm »
- user computing »
- computing cell »
- cell algorithm »
-
1
Resource allocation techniques for downlink Non-Orthogonal Multiple Access-Based 5G wireless systems
Published 2021“…The study addressed the optimization of resources in a single-cell and heterogeneous transmission systems using convex optimization techniques. …”
Get full text
Get full text
Thesis -
2
Energy-Efficient Low-Complexity Algorithm in 5G Massive MIMO Systems
Published 2021“…This formulates the optimization problem of joint optimal antenna selection, transmits power allocation and joint user selection to mitigate inter-cellinterference in downlink multi-cell massiveMIMO systems under minimized reuse of pilot sequences based on a novel iterative low-complexity algorithm (LCA) for Newton’s methods and Lagrange multipliers. …”
Get full text
Get full text
Get full text
Article -
3
Block based low complexity iterative QR precoder structure for Massive MIMO
Published 2021“…We make use of QR-based BD method to precode in a lower dimension channel matrix rather than computing all of them. …”
Get full text
Get full text
Thesis -
4
Multiple and solid data background scheme for testing static single cell faults on SRAM memories
Published 2013“…This method is evaluated in terms of function and performance differences between the proposed MTA and existing MTA using the User Defined Algorithm (UDA) available in the MBISTArchitect tool. …”
Get full text
Get full text
Thesis -
5
State-of-charge estimation for lithium-ion batteries with optimized self-supervised transformer deep learning model
Published 2023“…State-of-charge(SOC) is a quantity that reflects the amount of available energy left in lithium-ion(Li-ion)cells. Accurate SOC estimation allows for the optimization of charging-discharging schedule and usage time and facilitates the computation of other quantities needed to prolong battery lifespan and protect users from hazards. …”
text::Thesis -
6
-
7
Efficient radio resource allocation scheme for 5G networks with device-to-device communication
Published 2024journal::journal article -
8
-
9
Cloudids: Cloud Intrusion Detection Model Inspired By Dendritic Cell Mechanism
Published 2024“…In addition, maintenance of traditional IDS in Cloud Computing system requires expertise and consumes more time where not each Cloud user has. …”
Article -
10
Comparative analysis of danger theory variants in measuring risk level for text spam messages
Published 2024journal::journal article -
11
-
12
-
13
-
14
-
15
Application of genetic algorithm methods to optimize flowshop sequencing problem
Published 2008“…Genetic algorithm method was one of the methods that were widely used in solving optimization problem. …”
Get full text
Get full text
Undergraduates Project Papers -
16
Parallel system for abnormal cell growth prediction based on fast numerical simulation
Published 2010“…The predictor system depending on users input data via a user interface, generating the initial and boundary condition generated from parabolic or elliptic type of PDE. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Load balancing in 4G long term evolution / Marvin Hendary
Published 2013Get full text
Get full text
Thesis -
18
-
19
-
20
Sizing optimization of large-scale grid connected photovoltaic system using dolphin echolocation algorithm / Muhammad Zakyizzuddin Rosselan
Published 2018“…Later, an Iterative-based Sizing Algorithm (ISA) was developed to determine the optimal sizing solution which was later used as benchmark for sizing algorithms using optimization methods. …”
Get full text
Get full text
Thesis
