Search Results - (( mobile application drops algorithm ) OR ( _ application designing algorithm ))*

Refine Results
  1. 1

    Neighbour-based on-demand routing algorithms for mobile ad hoc networks by Ejmaa, Ali Mohamed E.

    Published 2017
    “…In terms of the applications, The DCFP is more suitable to be used for education applications, while the SNBR is a good algorithm designed to be used for rescue system as data and energy is the main concern. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Performance Enhancement of Routing Protocols in Mobile Wireless Ad-Hoc Networks Using Fuzzy Reasoning Algorithm by Natsheh, Essam Fathi

    Published 2006
    “…We will present the various application of that algorithm to ad-hoc routing protocols. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Resource Allocation and Mobility Prediction Algorithms for Multimedia Wireless Cellular Networks by Al-Sanabani, Maher Ali

    Published 2008
    “…Among the issues the telecommunication industry is the demand for multimedia applications with Quality of Service (QoS) in wireless/mobile networks. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Quality of service management algorithms in WiMAX networks by Saidu, Ibrahim

    Published 2015
    “…Simulation have been extensively used to evaluate the proposed algorithm. Finally, Discrete Event Simulator (DES) is designed and developed in order to evaluate the performance of the proposed algorithms. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Predictive Mobility Management Using Optimized Delays And Security Enhancements In IEEE 802.11 Infrastructure Networks by Biju, Issac

    Published 2008
    “…The reason for that is inherent in the mobility design problems of the existing implementations. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8
  9. 9

    Effects of Authentication of Users in Mobile Internet Protocol Version 6 by Obenofunde, Simon Tabi

    Published 2004
    “…Presently, mobility is difficult, if not impossible to detect at the application layer though easily detectable at the network layer. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Token based path allocation approach for mobile robots in sorting centre for achieving high throughput by Khoo, Zong Zheng

    Published 2024
    “…Thus, these problems seem to be the reasons that may be not that applicable and inefficient to apply in the real world. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11
  12. 12
  13. 13

    A new superimposed topology for single phase wireless power transfer / Azman Ab Malik by Ab Malik, Azman

    Published 2018
    “…The name of the device given is “The Chargiszi” where the purpose of the design is to supply electrical energy for mobile phone and laptop wirelessly. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    A new superimposed topology for single phase wireless power transfer / Azman Ab Malik by Ab Malik, Azman

    Published 2018
    “…The name of the device given is 'The Chargiszi" where the purpose of the design is to supply electrical energy for mobile phone and laptop wirelessly. …”
    Get full text
    Get full text
    Book Section
  16. 16
  17. 17
  18. 18
  19. 19

    CSC752: Advanced Algorithm & Analysis / College of Computing, Informatics and Media by UiTM, College of Computing, Informatics and Media

    Published 2022
    “…The algorithm design techniques topics and applications include divide and conquer, greedy algorithms, dynamic programming, network flow, NP-complete, approximation and other advanced algorithms.…”
    Get full text
    Get full text
    Get full text
    Teaching Resource
  20. 20

    CSC752: Advanced Algorithm & Analysis / College of Computing, Informatics and Mathematics by UiTM, College of Computing, Informatics and Mathematics

    Published 2018
    “…The algorithm design techniques topics and applications include divide and conquer, greedy algorithms, dynamic programming, network flow, NP-complete, approximation and other advanced algorithms.…”
    Get full text
    Get full text
    Get full text
    Teaching Resource