Search Results - (( _ application system algorithm ) OR ( wave applications need algorithm ))
Search alternatives:
- wave applications »
- applications need »
- system algorithm »
- need algorithm »
-
1
Deep Learning-Driven Mobility And Utility-Based Resource Management In Mm-Wave Enable Ultradense Heterogeneous Networks
Published 2025thesis::doctoral thesis -
2
Automated QT interval measurement using modified Pan-Tompkins algorithm with independent isoelectric line approach
Published 2020“…However, the physiological variability of the QRS complex and the fluctuation of the isoelectric line are prevalent issues that need to be considered in the automatic method. In this report, an algorithm to identify the QRS onset and T-wave offset for measuring the corrected QT interval (QTc) is proposed. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Energy-efficient power allocation for downlink non orthogonal multiple access networks based on game theory and genetic algorithm / Reem Mustafa Mah’d Al Debes
Published 2025“…Furthermore, the research explores advanced applications such as integrating NOMA with Millimeter-Wave technology and optimizing user association strategies, enhancing system capacity and overall performance. …”
Get full text
Get full text
Get full text
Thesis -
4
A novel design of an isochronous integration [iIntegration] framework for first/second order multidisciplinary transient systems
Published 2015“…All that is needed is a single novel GS4-2 framework for either second- and/or first-order systems, and we show how to switch from one to the other for illustrative applications to thermo-mechanical problems influenced by first/second order systems, respectively.…”
Get full text
Get full text
Get full text
Article -
5
-
6
RFID data reliability optimiser based on two dimensions bloom filter
Published 2017“…Radio frequency identification (RFID) is a flexible deployment technology that has been adopted in many applications especially in supply chain management. RFID system used radio waves to perform wireless interaction to detect and read data from the tagged object. …”
Get full text
Get full text
Article -
7
Secured mobile transaction using NFC Technology: Top-Up printing system
Published 2011“…As for the security measurement, MD5 algorithm is implemented to accept the system authorization. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
Determinants and prediction of home nursing utilization among older adults in China: an integration of logistic regression and XGBoost algorithm
Published 2026“…Clinical trial number: Not applicable.…”
Get full text
Get full text
Get full text
Article -
9
-
10
NFC secured online transaction in mobile computing business
Published 2012“…As for the security measurement, MD5 algorithm is implemented to process the system authorization. …”
Get full text
Get full text
Get full text
Article -
11
-
12
Development of eCall for Malaysia's automotive industries
Published 2019Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
A novel methodology for hydrocarbon depth prediction in seabed logging: Gaussian process-based inverse modeling of electromagnetic data
Published 2021“…Seabed logging (SBL) is an application of electromagnetic (EM) waves for detecting potential marine hydrocarbon-saturated reservoirs reliant on a source-receiver system. …”
Get full text
Get full text
Article -
14
-
15
-
16
Random traveling wave pulse coupled oscillator (RTWPCO) algorithm of energy-efficient wireless sensor networks
Published 2018“…As a result, it is more suitable and harder to identify demands in all applications. The pulse-coupled oscillator mechanism causing delay and uncharitable applications needs to reduce energy consumption to the smallest level. …”
Get full text
Get full text
Article -
17
Autonomous boat for underwater surveillance
Published 2019Get full text
Get full text
Get full text
Get full text
Article -
18
An approximation approach for free space wave propagation
Published 2009Get full text
Get full text
Conference or Workshop Item -
19
Implementation of a Symmetric Chaotic Encryption Scheme
Published 2004Get full text
Get full text
Final Year Project -
20
