A simplified computational technique for an LSF-based speed decoder
| Main Authors: | Mabrouk, Ahmed Abbas, Hassim, Norhidayah |
|---|---|
| Format: | Proceeding Paper |
| Language: | English |
| Published: |
2011
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/15072/ http://irep.iium.edu.my/15072/1/06026585_002.pdf |
Similar Items
A low-complexity, hardware architecture for a parametric, real-time LSF speech decoder
by: Mabrouk, Ahmed Hassan, et al.
Published: (2011)
by: Mabrouk, Ahmed Hassan, et al.
Published: (2011)
The performance of soft computing techniques on content-based SMS spam filtering
by: Hassan Saeed, Waddah Waheeb
Published: (2015)
by: Hassan Saeed, Waddah Waheeb
Published: (2015)
Simplified Azbel Model for Fitting Mortality Tables
by: Vasant, Pandian
Published: (2008)
by: Vasant, Pandian
Published: (2008)
DNA Computing Technique to Solve Vertex Coloring Problem
by: Hasudungan, Rofilde, et al.
Published: (2013)
by: Hasudungan, Rofilde, et al.
Published: (2013)
Modelling the movement of crowd evacuation using computational simulation technique
by: Noor Akma, Abu Bakar, et al.
Published: (2018)
by: Noor Akma, Abu Bakar, et al.
Published: (2018)
Quantum Particle Swarm Optimization Technique for Load Balancing in Cloud Computing
by: Elrasheed Ismail, Sultan
Published: (2013)
by: Elrasheed Ismail, Sultan
Published: (2013)
A new scheduling technique to improve data management in cloud computing
by: Khan, Nawsher
Published: (2013)
by: Khan, Nawsher
Published: (2013)
Mobile Cloud Computing & Mobile Battery Augmentation Techniques: A Survey
by: Ali, Mushtaq, et al.
Published: (2014)
by: Ali, Mushtaq, et al.
Published: (2014)
A Review Paper on Botnet and Botnet Detection Techniques in Cloud Computing
by: Shahid, Anwar, et al.
Published: (2014)
by: Shahid, Anwar, et al.
Published: (2014)
Deep Learning Techniques for Wind Speed Forecasting at Palembang Airport
by: Akbar Rizki, Ramadhan, et al.
Published: (2024)
by: Akbar Rizki, Ramadhan, et al.
Published: (2024)
A comparative performance analysis of computational intelligence techniques to solve the asymmetric travelling salesman problem
by: Odili, Julius Beneoluchi, et al.
Published: (2021)
by: Odili, Julius Beneoluchi, et al.
Published: (2021)
RFID-based vehicle speed monitoring and enforcement system
by: Tan, Kai Xian
Published: (2018)
by: Tan, Kai Xian
Published: (2018)
A simplified approach for computer-aided education of network reconfiguration in radial distribution systems
by: Prasad, K., et al.
Published: (2007)
by: Prasad, K., et al.
Published: (2007)
Anti-jamming capabilities of UWB-OFDM SAR
by: Hossain, Md Anowar, et al.
Published: (2011)
by: Hossain, Md Anowar, et al.
Published: (2011)
Adaptive UWB-OFDM synthetic aperture radar
by: Hossain, Md Anowar, et al.
Published: (2011)
by: Hossain, Md Anowar, et al.
Published: (2011)
The importance of monitoring cloud computing: An intensive review
by: Fahad, Ahmed Mohammed, et al.
Published: (2017)
by: Fahad, Ahmed Mohammed, et al.
Published: (2017)
Peak-to-average power ratio reduction based on optimized phase shift technique
by: Mohammed, Muamer N., et al.
Published: (2017)
by: Mohammed, Muamer N., et al.
Published: (2017)
Android: S-Based Technique in Mobile Malware Detection
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
Spatial information-based multimodal integration technique
by: Lee, Bee Wah
Published: (2006)
by: Lee, Bee Wah
Published: (2006)
Review of access control mechanisms in cloud computing
by: Muhammad Rizwan, Ghori, et al.
Published: (2018)
by: Muhammad Rizwan, Ghori, et al.
Published: (2018)
A simplified sphere decoding algorithm for MIMO transmission system
by: Noordin, Nor Kamariah, et al.
Published: (2005)
by: Noordin, Nor Kamariah, et al.
Published: (2005)
Data Security Issues In Cloud Computing: Review
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
Behavious based computer user clustering using rough set theory
by: Wang , Le Wei
Published: (2013)
by: Wang , Le Wei
Published: (2013)
Intrusion-Detection System Based on Fast Learning Network in Cloud Computing
by: Mohammed Hasan, Ali, et al.
Published: (2018)
by: Mohammed Hasan, Ali, et al.
Published: (2018)
An e-learning system in Malaysia based on green computing and energy level
by: Ullah, Arif, et al.
Published: (2017)
by: Ullah, Arif, et al.
Published: (2017)
A review on job scheduling technique in cloud computing and priority rule based intelligent framework
by: Murad, Saydul Akbar, et al.
Published: (2022)
by: Murad, Saydul Akbar, et al.
Published: (2022)
Reversible watermarking technique for fingerprint authentication based on DCT
by: Mohamed, Lebcir, et al.
Published: (2020)
by: Mohamed, Lebcir, et al.
Published: (2020)
Item-based collaborative filtering technique for movie recommender based on user preference
by: Wong, Wai Leong
Published: (2018)
by: Wong, Wai Leong
Published: (2018)
A new fuzzy granular technique for the condition monitoring of electrical hotspots based on infrared thermography
by: Ahmed, M. M., et al.
Published: (2018)
by: Ahmed, M. M., et al.
Published: (2018)
Aesthetical concept for human-computer interaction using fuzzy knowledge base clustering
by: Mashinchi, M. Reza, et al.
Published: (2007)
by: Mashinchi, M. Reza, et al.
Published: (2007)
An improved Watermarking Technique for Copyright Protection Based on Tchebichef Moments
by: Ernawan, Ferda, et al.
Published: (2019)
by: Ernawan, Ferda, et al.
Published: (2019)
Component Testing for VsImaging Library Using Pixel Comparison Technique
by: Muhammad Zulfahmi Toh, Abdullah, et al.
Published: (2013)
by: Muhammad Zulfahmi Toh, Abdullah, et al.
Published: (2013)
Detection and avoidance technique of anomalous congestion at the network gateways
by: Ahmed, Abdulghani Ali
Published: (2018)
by: Ahmed, Abdulghani Ali
Published: (2018)
Software Agent And Cloud Computing: A Brief Review
by: Firas, D. Ahmed, et al.
Published: (2016)
by: Firas, D. Ahmed, et al.
Published: (2016)
Wood species recognition based on phase - only correlation (POC) technique
by: Nik Kamariah, Nik Ismail
Published: (2013)
by: Nik Kamariah, Nik Ismail
Published: (2013)
PMT : opposition based learning technique for enhancing metaheuristic algorithms performance
by: Hammoudeh, S. Alamri
Published: (2020)
by: Hammoudeh, S. Alamri
Published: (2020)
Improving green IT assessment tool using case-based reasoning technique
by: Chua, Xiao Ying
Published: (2019)
by: Chua, Xiao Ying
Published: (2019)
Design of low power high speed digital vedic multiplier using 13T hybrid full adder
by: Lee, Shing Jie
Published: (2018)
by: Lee, Shing Jie
Published: (2018)
A review of challenges and security risks of cloud computing
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
A novel digital watermarking technique based on ISB (Intermediate Significant Bit)
by: Zeki, Akram M., et al.
Published: (2009)
by: Zeki, Akram M., et al.
Published: (2009)
Similar Items
-
A low-complexity, hardware architecture for a parametric, real-time LSF speech decoder
by: Mabrouk, Ahmed Hassan, et al.
Published: (2011) -
The performance of soft computing techniques on content-based SMS spam filtering
by: Hassan Saeed, Waddah Waheeb
Published: (2015) -
Simplified Azbel Model for Fitting Mortality Tables
by: Vasant, Pandian
Published: (2008) -
DNA Computing Technique to Solve Vertex Coloring Problem
by: Hasudungan, Rofilde, et al.
Published: (2013) -
Modelling the movement of crowd evacuation using computational simulation technique
by: Noor Akma, Abu Bakar, et al.
Published: (2018)