Search Results - (( mobile application among algorithm ) OR ( its application using algorithm ))*
Search alternatives:
- application among »
- among algorithm »
- its application »
- using algorithm »
-
1
A study of mobile IP and its security aspects in a LAN environment / Suhaila Che Ismail
Published 1998“…Mobility allows mobile node to communicate even distances away without restarting any applications in use. …”
Get full text
Get full text
Thesis -
2
Mobile game application development using evolutionary algorithms
Published 2014“…Evolutionary Algorithms have never been used on mobile applications, thus it gives a novel idea of utilizing Evolutionary Algorithms in developing applications typically in games for mobile platforms. …”
Get full text
Get full text
Get full text
Thesis -
3
Fuzzy Logic Based Self-Adaptive Handover Algorithm for MobileWiMAX.
Published 2013“…Among the challenging issues in mobile WiMAX handover are unnecessary handover, handover failure and handover delay, which may affect real-time applications. …”
Get full text
Get full text
Article -
4
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…Mostly, it attacks Android due to its popularity and high usage among end users. Every day, more and more malicious mobile applications (apps) with the botnet capability have been developed to exploit end users' smartphones. …”
Proceedings Paper -
5
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
6
Mobile data gathering algorithms for wireless sensor networks
Published 2014“…The selection of this parameter is based on the application requirements. Minimal Constrained Rendezvous Node (MCRN) algorithm is designed to ensure that the number of pause locations for the mobile element is minimized. …”
Get full text
Get full text
Thesis -
7
The implementation of forward chaining algorithm in calculating inheritance property based on faraid law / Nur Ain Syafiqah Mohammad Marzuki
Published 2021“…The distribution of properties is solved using Python Programming Language and also will verify using Inheritance Calculator Mobile Application. …”
Get full text
Get full text
Student Project -
8
Text spam messages classification using Artificial Immune System (AIS) algorithms
Published 2024thesis::master thesis -
9
Cloudlet deployment and task offloading in mobile edge computing using variable-length whale and differential evolution optimization and analytical hierarchical process for decisio...
Published 2023“…Mobile edge computing (MEC) is a well-known technique to support delay-sensitive applications at the edge of mobile networks. …”
Get full text
Get full text
Thesis -
10
ChoCD : Usable and secure graphical password authentication scheme
Published 2024thesis::master thesis -
11
Efficient and stable routing algorithm based on user mobility and node density in urban vehicular network
Published 2016“…Therefore, this paper proposes a novel routing algorithm called efficient and stable routing algorithm based on user mobility and node density (ESRA-MD). …”
Get full text
Get full text
Article -
12
Deep Learning-Driven Mobility And Utility-Based Resource Management In Mm-Wave Enable Ultradense Heterogeneous Networks
Published 2025thesis::doctoral thesis -
13
Dynamic area coverage algorithms for static and mobile wireless sensor network environments using voronoi techniques
Published 2011“…This thesis focuses on developing Voronoi Tessellation-based Coverage Optimization Algorithms for Static and Mobile Wireless Sensor Networks, where a large number of static nodes are supported by few mobile nodes in carrying out the sensing task. …”
Get full text
Get full text
Thesis -
14
Seamless horizontal handover algorithm for homogeneous wireless mobile networks using fuzzy logic
Published 2013“…The most important and society application of WiMAX is the mobile communication. When a mobile station changes its geographical position, it may also need to change its attachment point in the network in order to retain the quality of the connection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
-
16
An efficient network mobility management for a 6LoWPAN mobile network in hospital environments
Published 2017“…To this date, only a few works on NEMO for 6LoWPAN mobile networks have been reported. The foremost demand of medical application is the need to ensure quality of service (QoS) for data transfer due to its criticalness in medical context. …”
Get full text
Get full text
Thesis -
17
A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim
Published 2012“…Many previous researches focused on elliptic curve and its applications in mobile communication. The purpose of the qualitative study is to explore and develop basic understanding of the properties of the families of Edwards curves, one of the special forms of elliptic curves, and their applications in cryptography, using grounded theory approach, in which the data are hand-analyzed, coded and grouped into themes under study. …”
Get full text
Get full text
Research Reports -
18
Detection of Malaysian sign language with single shot detector algorithm/ Nurfarah Idayu Mohamad Fauzi, Shahirah Mohamed Hatim and Zalikha Zulkifli
Published 2023“…Single Shot Detector (SSD) algorithm was implemented to perform the Malaysian Sign Language object detection in the application. …”
Get full text
Get full text
Get full text
Article -
19
Enhanced weight-based clustering algorithm to provide reliable delivery for VANET safety applications
Published 2019“…This has led to unstable clusters which could affect the timely delivery of safety applications. In this study, enhanced weight-based clustering algorithm (EWCA) was developed to address these challenges. …”
Get full text
Get full text
Article -
20
Herb recognition for mobile apps / Jumriyanie Baba
Published 2017“…The mobile application is able to recognize the herbs type using the most suitable algorithm. …”
Get full text
Get full text
Thesis
