Search Results - (( its application using algorithm ) OR ( mobile applications drops algorithm ))*

Refine Results
  1. 1

    Neighbour-based on-demand routing algorithms for mobile ad hoc networks by Ejmaa, Ali Mohamed E.

    Published 2017
    “…In terms of the applications, The DCFP is more suitable to be used for education applications, while the SNBR is a good algorithm designed to be used for rescue system as data and energy is the main concern. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Quality of service management algorithms in WiMAX networks by Saidu, Ibrahim

    Published 2015
    “…Simulation have been extensively used to evaluate the proposed algorithm. Finally, Discrete Event Simulator (DES) is designed and developed in order to evaluate the performance of the proposed algorithms. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Effects of Authentication of Users in Mobile Internet Protocol Version 6 by Obenofunde, Simon Tabi

    Published 2004
    “…User security in the Internet has generally been well taken care of at the application layer. Judging from the mobility and portability of a mobile terminal and its ability to get connected to the Internet while away from home, it becomes necessary to be sure of who is using that terminal. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Performance Enhancement of Routing Protocols in Mobile Wireless Ad-Hoc Networks Using Fuzzy Reasoning Algorithm by Natsheh, Essam Fathi

    Published 2006
    “…We will present the various application of that algorithm to ad-hoc routing protocols. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Resource Allocation and Mobility Prediction Algorithms for Multimedia Wireless Cellular Networks by Al-Sanabani, Maher Ali

    Published 2008
    “…Among the issues the telecommunication industry is the demand for multimedia applications with Quality of Service (QoS) in wireless/mobile networks. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    Token based path allocation approach for mobile robots in sorting centre for achieving high throughput by Khoo, Zong Zheng

    Published 2024
    “…Thus, these problems seem to be the reasons that may be not that applicable and inefficient to apply in the real world. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10
  11. 11

    Predictive Mobility Management Using Optimized Delays And Security Enhancements In IEEE 802.11 Infrastructure Networks by Biju, Issac

    Published 2008
    “…Under the current technology, when a mobile node moves from one access point to another, the handoff is not always smooth and connection may be dropped as a result. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    A new superimposed topology for single phase wireless power transfer / Azman Ab Malik by Ab Malik, Azman

    Published 2018
    “…Size of coil had been explored by increasing the diameter size. 16cm and 160cm diamater size of coil had been explored using algorithm approach by Taguchi method. Result shows that by increasing the diameter size the distance had been improved by 500%. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    A new superimposed topology for single phase wireless power transfer / Azman Ab Malik by Ab Malik, Azman

    Published 2018
    “…Size of coil had been explored by increasing the diameter size. 16cm and 160cm diamater size of coil had been explored using algorithm approach by Taguchi method. Result shows that by increasing the diameter size the distance had been improved by 500%. …”
    Get full text
    Get full text
    Book Section
  16. 16

    Structural Equation Modeling Algorithm and Its Application in Business Analytics by Sorooshian, Shahryar

    Published 2017
    “…Novelty of this article is in modified steps of SEM application in modeling strategies, also in its developed practical comprehensive SEM application flowchart This article is a roadmap for business advisors and those scholars trying to compute SEM for their decision making, complex modeling and data analysis programming, …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  17. 17

    Fast decryption method for a Rabin primitive-based cryptosystem by Asbullah, Muhammad Asyraf, Kamel Ariffin, Muhammad Rezal

    Published 2014
    “…The Chinese Remainder Theorem (CRT) is an algorithm for solving linear congruence system into a unique representation and has been a useful tool in applications of cryptography. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Orthogonal least square algorithm and its application for modelling suspension system by Ahmad, Robiah, Jamaluddin, Hishamuddin

    Published 2001
    “…The derivation of the algorithm is presented and its application to the modelling of a car suspension system is included to demonstrate the effectiveness of the algorithm.…”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Schelkunoff array synthesis methods using adaptive-iterative algorithm by Abdul Latiff, Nurul Mu'azzah

    Published 2003
    “…By the co-emergence of these algorithms, a better performance and wider application are hoped to be achieved since each of these algorithms has its own advantages respectively. …”
    Get full text
    Get full text
    Get full text
    Thesis