Search Results - (( its applications mobile algorithm ) OR ( its application force algorithm ))*
Search alternatives:
- applications mobile »
- application force »
- its applications »
- mobile algorithm »
- its application »
- force algorithm »
-
1
-
2
-
3
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…Presently, many researches have been made on remote monitoring and its techniques. The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
Get full text
Get full text
Thesis -
4
Review on real-time control schemes for wheeled mobile robot
Published 2018Get full text
Get full text
Get full text
Conference or Workshop Item -
5
-
6
Backhaul load and performance optimality of partial joint processing schemes in LTE-A networks
Published 2014“…The utility of PJP schemes for three different traffic types shows that DPS is preferred over JT for elastic and adaptive applications. The significance of the proposed algorithm is also proven in comparison with previous approach by maintaining the same performance while reducing the backhaul load up to 30%. …”
Get full text
Get full text
Thesis -
7
Multipath routing protocol based on cross-layer approach for MANET
Published 2017“…Mobile Ad-hoc Networks (MANETs) involved in many applications, whether smart or traditional and for both civilian and military uses, and that because of their special features, where it does not depend on any infrastructure during its working, as well as the nodes in MANETs have a freedom of movement with the ability to self-configure, in addition, to working as a router or client at the same time. …”
Get full text
Get full text
Get full text
Article -
8
A study of mobile IP and its security aspects in a LAN environment / Suhaila Che Ismail
Published 1998“…Mobility allows mobile node to communicate even distances away without restarting any applications in use. …”
Get full text
Get full text
Thesis -
9
-
10
IMPLEMENTATION OF GRAPH BASED PATH PLANNING ALGORITHMS FOR INDOOR NAVIGATION
Published 2018“…Thus, the A* algorithm is implemented in a small mobile robot, this is to see its effectiveness in real world application. …”
Get full text
Get full text
Final Year Project -
11
Scan Matching and KNN Classification for Mobile Robot Localisation Algorithm
Published 2017Get full text
Get full text
Conference or Workshop Item -
12
Fuzzy Logic Based Self-Adaptive Handover Algorithm for MobileWiMAX.
Published 2013“…Simulation results show that the proposed FuzSAHO algorithm reduces the number of ping-pong handover and its delay. …”
Get full text
Get full text
Article -
13
Fast handover algorithm for hierarchical mobile IPv6 macro-mobility management
Published 2003Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
Performance evaluation of PID controller optimisation for wheel mobile robot using Bat based optimisation algorithm
Published 2022“…Applications of mobile robots cover both industrial and domestic area. …”
Get full text
Get full text
Book Chapter -
15
-
16
A new efficient checkpointing algorithm for distributed mobile computing
Published 2015“…This algorithm is characterized by its efficiency and optimization in terms of incurred time-space overhead during checkpointing process and normal application running period.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
17
Active force control with iterative learning control algorithm for a vehicle suspension
Published 2013“…The research focuses on the application of an active force control (AFC) strategy with iterative learning control (ILC) algorithms to compensate for the various introduced road profiles or 'disturbances' in a quarter car suspension system as an improvement to ride comfort performance. …”
Get full text
Get full text
Thesis -
18
Implementation of Cognitive Mapping Algorithm for Robot Navigation System
Published 2014Get full text
Get full text
Get full text
Proceeding Paper -
19
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…Mostly, it attacks Android due to its popularity and high usage among end users. Every day, more and more malicious mobile applications (apps) with the botnet capability have been developed to exploit end users' smartphones. …”
Proceedings Paper -
20
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper
