Search Results - (( _ application ((a algorithm) OR (new algorithm)) ) OR ( mobile application during algorithm ))*

Refine Results
  1. 1

    A new efficient checkpointing algorithm for distributed mobile computing by Mansouri, Houssem, Badache, Nadjib, Aliouat, Makhlouf, Pathan, Al-Sakib Khan

    Published 2015
    “…In fact, it is necessary now to think about other techniques or at least adapt those to devise effective and well suited techniques for the mobile environment. Considering this issue, the contribution in this paper is a proposal of a new checkpointing algorithm suitable for mobile computing systems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Mobile Map-Based Positioning System Using Segmentation Algorithm (MM-BPS) by Migdady, Hazem Moh'd Ali

    Published 2008
    “…Vaishnavi and Kuechler Methodology has been implemented in various applications and it considered as a general methodology to develop totally new algorithms and create new information according to the accumulated information. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    A study of mobile IP and its security aspects in a LAN environment / Suhaila Che Ismail by Che Ismail, Suhaila

    Published 1998
    “…This is a new solution meant for a mobile node that might be utilising applications that may not be interrupted when the mobile node moves from one link to another. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7
  8. 8

    Prediction and multi-criteria-based schemes for seamless handover mechanism in mobile WiMAX networks by Mubarak, Mohammed Awadh Ahmed Ben

    Published 2013
    “…Finally, the FuzSAHO decision algorithim is optimized for real-time application, by using a new handover criteria, namely queue length besides RSSI and MS velocity. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Modelling of Crowd Evacuation with Communication Strategy Using Social Force Model by Norhaida, Hussain, Wai Shiang, Cheah

    Published 2022
    “…As mobile crowd steering applications require user interaction during fire evacuation, we have foreseen a gap in current simulation algorithms, which leads to unrealistic simulation. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing by Goh, Kwang Yi

    Published 2023
    “…We enhanced the Q-Learning algorithm for action selection based on potential action abilities and proposed a tool, namely CrashDroid, that allows the automation of testing context-aware Android applications. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    3D virtual modelling and stabilization control of triple links inverted pendulum on two-wheeled system using enhanced interval type-2 fuzzy logic control by Muhammad Firdaus, Masrom

    Published 2020
    “…This model is proposed to represent a real hardware application for example mobile robot, walking robot and an airplane landing system. …”
    Get full text
    Get full text
    Thesis
  15. 15

    AN INVESTIGATION OF INDOOR LOCALIZATION BASED ON WI-FI FOR MOBILE USER by NOORMISLAN, HAMIM AKMAL IKHTIARUDIN

    Published 2019
    “…A new indoor localization system with the make use of matching algorithms is developed and analyzed.”…”
    Get full text
    Get full text
    Final Year Project
  16. 16

    A framework of rough cultural algorithms in optimizing mobile web caching performance by Sulaiman, Sarina, Shamsuddin, Siti Maryam, Abraham, Ajith, Sulaiman, Shahida

    Published 2007
    “…The common cause of poor performance is due to the direct access to the server (e.g. pitiable performance of server-side applications or during burst crowds) and network infrastructure (e.g. long geographical distances, network overloads, etc.). …”
    Get full text
    Get full text
    Article
  17. 17

    Improved autonomous charging of mobile multi-robots using honeybee-inspired algorithm by Ahmad@Mohd Yusoff, Faisul Arif

    Published 2016
    “…It is also known as application that applies large number of mobile robot. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Permission-based fault tolerant mutual exclusion algorithm for mobile Ad Hoc networks by Zarafshan, Faraneh

    Published 2015
    “…Due to these limitations, conventional mutual exclusion algorithms presented for distributed systems (DS) are not applicable for MANETs unless they attach to a mechanism for dynamic changes in their topology. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20