Search Results - (( its application a algorithm ) OR ( mobile applications new algorithm ))
Search alternatives:
- mobile applications »
- applications new »
- its application »
- application a »
- new algorithm »
- a algorithm »
-
1
A new efficient checkpointing algorithm for distributed mobile computing
Published 2015“…In fact, it is necessary now to think about other techniques or at least adapt those to devise effective and well suited techniques for the mobile environment. Considering this issue, the contribution in this paper is a proposal of a new checkpointing algorithm suitable for mobile computing systems. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
2
A study of mobile IP and its security aspects in a LAN environment / Suhaila Che Ismail
Published 1998“…This is a new solution meant for a mobile node that might be utilising applications that may not be interrupted when the mobile node moves from one link to another. …”
Get full text
Get full text
Thesis -
3
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
4
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…Therefore, this paper presents a new mobile botnet classification based on permission and Application Programming Interface (API) calls in the smartphone. …”
Proceedings Paper -
5
Performance evaluation of PID controller optimisation for wheel mobile robot using Bat based optimisation algorithm
Published 2022“…In this study, a new proposed hybrid optimization algorithm, called Extended Bat Algorithm (EBA) is used for optimizing the PID controller for the wheel mobile robot. …”
Get full text
Get full text
Book Chapter -
6
Fast handover algorithm for hierarchical mobile IPv6 macro-mobility management
Published 2003Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
Adaptive fault tolerant checkpointing algorithm for cluster based mobile Ad Hoc networks
Published 2015“…This has made possible to create a distributed mobile computing application and has also brought several new challenges in distributed algorithm design. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
-
9
Mobile game application development using evolutionary algorithms
Published 2014“…Evolutionary Algorithms have never been used on mobile applications, thus it gives a novel idea of utilizing Evolutionary Algorithms in developing applications typically in games for mobile platforms. …”
Get full text
Get full text
Get full text
Thesis -
10
-
11
Neighbour-based on-demand routing algorithms for mobile ad hoc networks
Published 2017“…In terms of the applications, The DCFP is more suitable to be used for education applications, while the SNBR is a good algorithm designed to be used for rescue system as data and energy is the main concern. …”
Get full text
Get full text
Get full text
Thesis -
12
-
13
Industry 4.0 With Intelligent Manufacturing 5G Mobile Robot Based On Genetic Algorithm
Published 2021“…A manufacturing fifth-generation (5G) mobile robot is a new development of industry 4.0 application, deploying an unmanned system. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Prediction and multi-criteria-based schemes for seamless handover mechanism in mobile WiMAX networks
Published 2013“…However, mobility in WiMAX system is still an issue when a mobile station (MS) moves and its connection is handed over between base stations (BSs). …”
Get full text
Get full text
Thesis -
15
Text spam messages classification using Artificial Immune System (AIS) algorithms
Published 2024thesis::master thesis -
16
-
17
An algorithm for navigation of mobile robots in cluttered environments
Published 2013Get full text
Get full text
Article -
18
IMPLEMENTATION OF BEHAVIOUR BASED NAVIGATION IN A PHYSICALLY CONFINED SITE
Published 2017Get full text
Get full text
Final Year Project -
19
Simulation and Design of an Intelligent Mobile Robot for Fire Fighting
Published 2003“…Keywords: (Fuzzy logic control, mobile robot, part recognition algorithms)…”
Get full text
Get full text
Thesis -
20
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…The proposed algorithm employs a combined model that uses two different measures (nonconformity metric measures and Local Distance-based Outlier Factor (LDOF)) to improve its detection ability. …”
Get full text
Get full text
Get full text
Thesis
