Search Results - (( mobile application among algorithm ) OR ( its application during algorithm ))*

Refine Results
  1. 1

    A study of mobile IP and its security aspects in a LAN environment / Suhaila Che Ismail by Che Ismail, Suhaila

    Published 1998
    “…The algorithm consideration is sine qua non in setting-up the whole network system allowing the mobile devices to move freely among sub-networks. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4

    Seamless horizontal handover algorithm for homogeneous wireless mobile networks using fuzzy logic by Ibrahim, Mohammed Khaleel

    Published 2013
    “…The most important and society application of WiMAX is the mobile communication. When a mobile station changes its geographical position, it may also need to change its attachment point in the network in order to retain the quality of the connection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9

    Mobile game application development using evolutionary algorithms by Ong, Jia Hui

    Published 2014
    “…Evolutionary Algorithms have never been used on mobile applications, thus it gives a novel idea of utilizing Evolutionary Algorithms in developing applications typically in games for mobile platforms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Enhancing the QoS performance for mobile station over LTE and WiMAX networks / Mhd Nour Hindia by Hindia, Mhd Nour

    Published 2015
    “…On the second level, TOPSIS algorithm allocates resources among an application’s user based on their criteria and the application’s preferences. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Context Aware Handover Algorithms For Mobile Positioning Systems by Zaman Khan, Sazid, Thilek, Silvadorai, Tan, Chen Wei, Ramadass, Sureswaran, Anwar, Toni

    Published 2014
    “…This work proposes context aware handover algorithms for mobile positioning systems. The algorithms perform handover among positioning systems based on important contextual factors related to position determination with efficient use of battery. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Multipath routing protocol based on cross-layer approach for MANET by Allahham, Alaa Azmi, Mohammed, Muamer N., Kadhim, Nassir Sallom

    Published 2017
    “…Mobile Ad-hoc Networks (MANETs) involved in many applications, whether smart or traditional and for both civilian and military uses, and that because of their special features, where it does not depend on any infrastructure during its working, as well as the nodes in MANETs have a freedom of movement with the ability to self-configure, in addition, to working as a router or client at the same time. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    A Mobile Application For Stock Price Prediction by Choy, Yi Tou

    Published 2021
    “…The results show ARIMA has the least error among all five prediction algorithms. Therefore, ARIMA is the best prediction model to implement in the mobile application for stock price prediction. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14
  15. 15

    Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim by Masmuhallim, Anis Athirah

    Published 2024
    “…Unfortunately, the abundance of mobile applications and lax management of some app stores has led to potential risks for mobile users, including privacy breaches and malicious deductions of fees, among other adverse consequences. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Fuzzy Logic Based Self-Adaptive Handover Algorithm for MobileWiMAX. by Mohd Ali, Borhanuddin, Ismail, Alyani, Noordin, Nor Kamariah, Ben-Mubarak, Mohammed A., Ng , Ben Chee Kyun

    Published 2013
    “…Among the challenging issues in mobile WiMAX handover are unnecessary handover, handover failure and handover delay, which may affect real-time applications. …”
    Get full text
    Get full text
    Article
  17. 17

    A New Mobile Botnet Classification based on Permission and API Calls by Yusof, M, Saudi, MM, Ridzuan, F

    Published 2024
    “…Mostly, it attacks Android due to its popularity and high usage among end users. Every day, more and more malicious mobile applications (apps) with the botnet capability have been developed to exploit end users' smartphones. …”
    Proceedings Paper
  18. 18
  19. 19

    Mobile data gathering algorithms for wireless sensor networks by Ghaleb, Mukhtar Mahmoud Yahya

    Published 2014
    “…This algorithm enables shortened tour length for the respective mobile element. …”
    Get full text
    Get full text
    Thesis
  20. 20