Search Results - (( _ applications usage algorithm ) OR ( its application ((max algorithm) OR (based algorithm)) ))*

Refine Results
  1. 1

    Fuzzy Logic Based Self-Adaptive Handover Algorithm for MobileWiMAX. by Mohd Ali, Borhanuddin, Ismail, Alyani, Noordin, Nor Kamariah, Ben-Mubarak, Mohammed A., Ng , Ben Chee Kyun

    Published 2013
    “…In this paper, a fuzzy logic based self-adaptive handover (FuzSAHO) algorithm is introduced. …”
    Get full text
    Get full text
    Article
  2. 2

    Batch mode heuristic approaches for efficient task scheduling in grid computing system by Maipan-Uku, Jamilu Yahaya

    Published 2016
    “…To address these problems, this research proposes three new distributed static batch mode inspired algorithms. The first (proposed) algorithm is based on Min-Min, called Min-Diff, the second algorithm is based on Max-Min, called Max-Average, and the third algorithm is to handle the load balancing, called Efficient Load Balancing (ELB). …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Max degree around (MDA) algorithm: a smart and efficient approximate algorithm for Vertex cover and independent set problems by Fayaz, Muhammad, Arshad, S, Shah, A.S, Shah, Asadullah

    Published 2016
    “…These problems motivated to propose Max Degres Around (MDA) approximation algorithm for the MVC problem. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Quality of service management algorithms in WiMAX networks by Saidu, Ibrahim

    Published 2015
    “…Thirdly, an energy algorithm called the Efficient Battery Life-aware Power Saving (EBLAPS) algorithm is proposed to address the problems of minimizing energy at the expense of response due to how energy sleep parameters are adjusted based on the residual energy and the use of standard sleep mode algorithms consumes high energy because of frequent transition to listening mode in the case of light traffic. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Prediction and multi-criteria-based schemes for seamless handover mechanism in mobile WiMAX networks by Mubarak, Mohammed Awadh Ahmed Ben

    Published 2013
    “…However, mobility in WiMAX system is still an issue when a mobile station (MS) moves and its connection is handed over between base stations (BSs). …”
    Get full text
    Get full text
    Thesis
  8. 8

    IMPLEMENTATION OF GRAPH BASED PATH PLANNING ALGORITHMS FOR INDOOR NAVIGATION by SYED KHAIZURA, SYED HUSEIN KAMIL

    Published 2018
    “…Thus, the A* algorithm is implemented in a small mobile robot, this is to see its effectiveness in real world application. …”
    Get full text
    Get full text
    Final Year Project
  9. 9
  10. 10
  11. 11
  12. 12

    Automatic algorithm applied for calculating thermal conductivity by transient plane source method by Jia, Zhijie, Yang, Liping, Cao, Chengcheng, Li, Huidong, Luo, Caiyun, Tao, Te, Zhong, Qiu, Xu, Zijun, Chen, Zezhong

    Published 2024
    “…To address this issue, an automatic algorithm based on the international standard (ISO22007-2:2008) is proposed in this paper. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    A genetic similarity algorithm for searching the Gene Ontology terms and annotating anonymous protein sequences by M. Othman, Razib, Deris, Safaai, Md. IIlias, Rosli

    Published 2008
    “…To show the applicability of the basic UTMGO, we extend its structure to develop a Gene Ontology -based protein sequence annotation tool named extended UTMGO. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19

    Design and implementation of cordic algorithm with sinusoidal pulse width modulation switching strategy by Madzzaini, Nur Sofea Eleena

    Published 2017
    “…Coordinate Rotation, Digital Computer (CORDIC), known as Volders Algorithm based on its inventor, is an algorithm that is applied to perform trigonometric related computations. …”
    Get full text
    Get full text
    Student Project
  20. 20

    A New Mobile Botnet Classification based on Permission and API Calls by Yusof, M, Saudi, MM, Ridzuan, F

    Published 2024
    “…Mostly, it attacks Android due to its popularity and high usage among end users. Every day, more and more malicious mobile applications (apps) with the botnet capability have been developed to exploit end users' smartphones. …”
    Proceedings Paper