Search Results - (( its application need algorithm ) OR ( wave application system algorithm ))*

Refine Results
  1. 1
  2. 2

    Energy-efficient power allocation for downlink non orthogonal multiple access networks based on game theory and genetic algorithm / Reem Mustafa Mah’d Al Debes by Reem Mustafa , Mah’d Al Debes

    Published 2025
    “…Furthermore, the research explores advanced applications such as integrating NOMA with Millimeter-Wave technology and optimizing user association strategies, enhancing system capacity and overall performance. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Secured mobile transaction using NFC Technology: Top-Up printing system by Ayu, Media Anugerah, Mantoro, Teddy, Brotosaputro, Gunawan, Ain, Nur F., Ghazali, Noorzalina

    Published 2011
    “…As for the security measurement, MD5 algorithm is implemented to accept the system authorization. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  4. 4

    NFC secured online transaction in mobile computing business by Mantoro, Teddy, Ayu, Media Anugerah, Brotosaputro, Gunawan, Ain, Nur F., Ghazali, Noorzalina

    Published 2012
    “…As for the security measurement, MD5 algorithm is implemented to process the system authorization. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    A novel methodology for hydrocarbon depth prediction in seabed logging: Gaussian process-based inverse modeling of electromagnetic data by Daud, H., Mohd Aris, M.N., Mohd Noh, K.A., Dass, S.C.

    Published 2021
    “…Seabed logging (SBL) is an application of electromagnetic (EM) waves for detecting potential marine hydrocarbon-saturated reservoirs reliant on a source-receiver system. …”
    Get full text
    Get full text
    Article
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10

    Design and implementation of cordic algorithm with sinusoidal pulse width modulation switching strategy by Madzzaini, Nur Sofea Eleena

    Published 2017
    “…Usually, one sinusoidal wave is used for one inverter. In this design, SPWM is used for multilevel inverter application in photovoltaic (PV) system. …”
    Get full text
    Get full text
    Student Project
  11. 11

    An Accurate and Efficient Shooting-and-bouncing-polygon Ray Tracer For Radio Propagation Modelling by Teh, Chin Hui

    Published 2019
    “…SBP-CCP simulation results also show very good match (2 dB rootmean-square error) to full-wave solutions computed using CST Microwave.Studio time domain solver, in an indoor application with reflection, transmission, diffraction, and lossy walls with thickness. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12
  13. 13
  14. 14

    Cardiac abnormality prediction using tansig based multilayer perceptron by Mohanty, Sibani Priyadarshini, Syahrull Hi-Fi Syam Ahmad Jamil, Jailani Abdul Kadir, Mohd Salman Mohd Sabri, Fakroul Ridzuan Hashim

    Published 2021
    “…An artificial neural network (ANN) is a network designed with adaptation to a computer system. The developed computer system will perform functions oriented to the way the brain works (neuron concept). …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16
  17. 17

    DESIGN AND DEVELOPMENT OF MULTI-INPUT SENSOR ALGORITHM FOR AUTONOMOUS UNDERWATER VEHICLE (AUV) APPLICATIONS by Mohd Aras, Mohd Shahrieel, Jamaluddin, Muhamed Herman, Kasdirin, Hyreil Anuar

    Published 2010
    “…This project is to design and develop a multi-input algorithm of sensors for Autonomous Underwater Vehicle (AUV) applications which is having high performance automated detection and monitoring on underwater application or for surveillances and defense application. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19

    Iterative And Single-Step Solutions Of Two Dimensional Time-Domain Inverse Scattering Problem Featuring Ultra Wide Band Sensors by Binajjaj, Saeed Ali Saeed

    Published 2010
    “…First, the algorithms‘ performances were evaluated using numerical simulation employing two different scanning geometries: limited and full view scanning geometries, where the applicability of these algorithms was accessed by comparing the reconstructed images with actual model. …”
    Get full text
    Get full text
    Thesis
  20. 20