Search Results - (( wave application matching algorithm ) OR ( its applications usage algorithm ))
Search alternatives:
- application matching »
- applications usage »
- wave application »
- its applications »
- usage algorithm »
-
1
-
2
-
3
-
4
MSS-TCP: a congestion control algorithm for boosting TCP performance in mmwave cellular networks
Published 2025“…The increasing demand for high-speed, low-latency applications, especially with 5G mmWave technology, has led to challenges in TCP performance due to signal blockages, small buffers, and high Packet Error Rates (PERs). …”
Get full text
Get full text
Get full text
Article -
5
Iterative And Single-Step Solutions Of Two Dimensional Time-Domain Inverse Scattering Problem Featuring Ultra Wide Band Sensors
Published 2010“…First, the algorithms‘ performances were evaluated using numerical simulation employing two different scanning geometries: limited and full view scanning geometries, where the applicability of these algorithms was accessed by comparing the reconstructed images with actual model. …”
Get full text
Get full text
Thesis -
6
Development of Graphical User Interface (GUI) for Antenna Design
Published 2016Get full text
Get full text
Final Year Project -
7
Person identification in irregular cardiac conditions using electrocardiogram signals
Published 2011Get full text
Get full text
Get full text
Proceeding Paper -
8
Web Usage Mining Using GSP Algorithm: A Study on Sultanah Bahiyah Library Online Databases
Published 2008“…Application of data mining to the World Wide Web referred as Web mining is at the cross road of research from several research communities which can be divided into three branches: Web Content Mining, Web Structure Mining and Web Usage Mining. …”
Get full text
Get full text
Get full text
Thesis -
9
-
10
IMPLEMENTATION OF GRAPH BASED PATH PLANNING ALGORITHMS FOR INDOOR NAVIGATION
Published 2018“…Thus, the A* algorithm is implemented in a small mobile robot, this is to see its effectiveness in real world application. …”
Get full text
Get full text
Final Year Project -
11
PHASE AMBIGUITY REDUCTION IN LASER INTERACTED INTERFEROGRAMS
Published 2006Get full text
Get full text
Article -
12
-
13
Fair Traffic Scheduling and Shaping Algorithms for Diffserv Networks
Published 2006“…This thesis investigates the effect of different scheduling mechanisms and usage of a different marker algorithms then develop and implement a fair scheduling mechanism and integrate it with a shaper with the usage of a very fair efficient marker at the edge of the DiffServ networks with the usage of simulation and analytical techniques. …”
Get full text
Get full text
Thesis -
14
-
15
-
16
Design and implementation of cordic algorithm with sinusoidal pulse width modulation switching strategy
Published 2017“…In addition, CORDIC algorithm has a low usage of memory space compared to Look Up table (LUT) technique. …”
Get full text
Get full text
Student Project -
17
A genetic similarity algorithm for searching the Gene Ontology terms and annotating anonymous protein sequences
Published 2008“…The genetic similarity algorithm combines semantic similarity measure algorithm with parallel genetic algorithm. …”
Get full text
Get full text
Get full text
Article -
18
Mining Web usage using FRS
Published 2018“…Web Usage Mining (WUM) is the application of data mining methods in extracting potentially useful information from web usage data. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
Resource-Efficient Coverage Path Planning for UAV-Based Aerial IoT Gateway
Published 2023“…As a result, the Energy Efficient Coverage Path Planning (EECPP) algorithm has been proposed. The EECPP is composed of two algorithms: the Stop Point Prediction Algorithm using K-Means, and Path Planning Algorithm using Particle Swarm Optimization. …”
Get full text
Get full text
Get full text
Article -
20
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…Mostly, it attacks Android due to its popularity and high usage among end users. Every day, more and more malicious mobile applications (apps) with the botnet capability have been developed to exploit end users' smartphones. …”
Proceedings Paper
