Search Results - (( its application model algorithm ) OR ( mobile application system algorithm ))
Search alternatives:
- application model »
- system algorithm »
- its application »
- model algorithm »
-
1
Text spam messages classification using Artificial Immune System (AIS) algorithms
Published 2024thesis::master thesis -
2
ChoCD : Usable and secure graphical password authentication scheme
Published 2024thesis::master thesis -
3
3D virtual modelling and stabilization control of triple links inverted pendulum on two-wheeled system using enhanced interval type-2 fuzzy logic control
Published 2020“…This model is proposed to represent a real hardware application for example mobile robot, walking robot and an airplane landing system. …”
Get full text
Get full text
Thesis -
4
Designing and implementation of robot mapping algorithm for mobile robot
Published 2014Get full text
Get full text
Get full text
Proceeding Paper -
5
Deep Learning-Driven Mobility And Utility-Based Resource Management In Mm-Wave Enable Ultradense Heterogeneous Networks
Published 2025thesis::doctoral thesis -
6
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…This thesis presents a research whose objective is to design an intrusion detection model for Mobile Ad hoc NETworks (MANET). MANET is an autonomous system consisting of a group of mobile nodes with no infrastructure support. …”
Get full text
Get full text
Get full text
Thesis -
7
Age And Gender Recognition Mobile App
Published 2023“…Therefore, this study aimed to develop age and gender recognition mobile application using deep learning algorithm. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
8
Virtual room decorator in android
Published 2012“…Also provides a simulation mobile platform to test and validate different rover chassis design,its navigation and locomotion algorithms,and the support rover operation for the application built.Besides,the comparison with the various related current systems and applications in the web browser and usability of popular mobile application platforms also issued here.…”
Get full text
Get full text
Undergraduates Project Papers -
9
Cloudlet deployment and task offloading in mobile edge computing using variable-length whale and differential evolution optimization and analytical hierarchical process for decisio...
Published 2023“…Mobile edge computing (MEC) is a well-known technique to support delay-sensitive applications at the edge of mobile networks. …”
Get full text
Get full text
Thesis -
10
A framework of modified adaptive neuro-fuzzy inference engine
Published 2012“…The performance of MANFIE was compared with existing methods in a diversity of practical benchmark applications such as pattern classifications, time series predictions, modeling with inverse learning control and mobile robot navigation. …”
Get full text
Get full text
Thesis -
11
-
12
Wifi positioning system / Amalina Abdul Halim
Published 2006“…This paper present the experimental results that demonstrate the ability of Wifi Positioning system to estimate location of the devices using K-NN algorithm and result in application part is shown based on highest percentage accuracy of time taken to intend bus stop.…”
Get full text
Student Project -
13
Quality of service management algorithms in WiMAX networks
Published 2015“…In addition, an analytical model for the proposed scheme is developed. Secondly, a Load-Aware Weighted Round Robin algorithm (LAWRR) packet scheduling discipline for downlink traffic in 802.16 networks is proposed to improve the poor performance of scheduling algorithm that use static weights under bursty traffic. …”
Get full text
Get full text
Thesis -
14
Off-the-shelf indoor localization system using radio frequency for wireless local area network
Published 2018“…Finally, the proposed Bayesian graphical model based on fingerprinting location algorithm is compared with Madigan model. …”
Get full text
Get full text
Thesis -
15
Risk Concentration for Context Assessment (RiCCA) of SMS Messages using Danger Theory
Published 2024“…This RiCCA prototype is developed from Danger Theory algorithms that is Dendritic Cell Algorithm (DCA) and Deterministic Dendritic Cell Algorithm (dDCA). …”
thesis::doctoral thesis -
16
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
17
Development of a Reliable Multicast Protocol in Mobile Ad Hoc Networks
Published 2008Get full text
Get full text
Thesis -
18
Leader follower pattern formation control using ros for mobile robot application
Published 2022Get full text
Get full text
Undergraduates Project Papers -
19
Cornsense: leaf disease detection application / Iffah Fatinah Mohamad Nasir
Published 2025“…The purpose of this project is to develop a mobile application for corn leaf disease detection leveraging the YOLOv8 (You Only Look Once version 8) object detection algorithm. …”
Get full text
Get full text
Thesis -
20
Secured mobile transaction using NFC Technology: Top-Up printing system
Published 2011“…As for the security measurement, MD5 algorithm is implemented to accept the system authorization. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
