Search Results - (( mobile application drops algorithm ) OR ( _ application using algorithm ))*
Search alternatives:
-
1
Neighbour-based on-demand routing algorithms for mobile ad hoc networks
Published 2017“…In terms of the applications, The DCFP is more suitable to be used for education applications, while the SNBR is a good algorithm designed to be used for rescue system as data and energy is the main concern. …”
Get full text
Get full text
Get full text
Thesis -
2
Performance Enhancement of Routing Protocols in Mobile Wireless Ad-Hoc Networks Using Fuzzy Reasoning Algorithm
Published 2006“…We will present the various application of that algorithm to ad-hoc routing protocols. …”
Get full text
Get full text
Thesis -
3
AntNet: a robust routing algorithm for data networks
Published 2004Get full text
Get full text
Get full text
Article -
4
Deep Learning-Driven Mobility And Utility-Based Resource Management In Mm-Wave Enable Ultradense Heterogeneous Networks
Published 2025thesis::doctoral thesis -
5
Quality of service management algorithms in WiMAX networks
Published 2015“…Simulation have been extensively used to evaluate the proposed algorithm. Finally, Discrete Event Simulator (DES) is designed and developed in order to evaluate the performance of the proposed algorithms. …”
Get full text
Get full text
Thesis -
6
Resource Allocation and Mobility Prediction Algorithms for Multimedia Wireless Cellular Networks
Published 2008“…Among the issues the telecommunication industry is the demand for multimedia applications with Quality of Service (QoS) in wireless/mobile networks. …”
Get full text
Get full text
Thesis -
7
Token based path allocation approach for mobile robots in sorting centre for achieving high throughput
Published 2024“…Thus, it may be hard to apply this proposed solution in the use of real-life. Also, there are papers that proposes algorithms that are able to solve deadlocks and collision among these robots but not able to solve the heavy traffic problem while passing through an intersection grid cell. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Effects of Authentication of Users in Mobile Internet Protocol Version 6
Published 2004“…User security in the Internet has generally been well taken care of at the application layer. Judging from the mobility and portability of a mobile terminal and its ability to get connected to the Internet while away from home, it becomes necessary to be sure of who is using that terminal. …”
Get full text
Get full text
Thesis -
9
-
10
-
11
Predictive Mobility Management Using Optimized Delays And Security Enhancements In IEEE 802.11 Infrastructure Networks
Published 2008“…Our contribution to mobility management is to propose a mobility prediction algorithm using location tracking and data mining, to propose a delay management approach that cuts down major delays, and to propose a two stage resource reservation scheme. …”
Get full text
Get full text
Get full text
Thesis -
12
-
13
-
14
A new superimposed topology for single phase wireless power transfer / Azman Ab Malik
Published 2018“…Size of coil had been explored by increasing the diameter size. 16cm and 160cm diamater size of coil had been explored using algorithm approach by Taguchi method. Result shows that by increasing the diameter size the distance had been improved by 500%. …”
Get full text
Get full text
Thesis -
15
A new superimposed topology for single phase wireless power transfer / Azman Ab Malik
Published 2018“…Size of coil had been explored by increasing the diameter size. 16cm and 160cm diamater size of coil had been explored using algorithm approach by Taguchi method. Result shows that by increasing the diameter size the distance had been improved by 500%. …”
Get full text
Get full text
Book Section -
16
Schelkunoff array synthesis methods using adaptive-iterative algorithm
Published 2003“…By the co-emergence of these algorithms, a better performance and wider application are hoped to be achieved since each of these algorithms has its own advantages respectively. …”
Get full text
Get full text
Get full text
Thesis -
17
Application of genetic algorithm methods to optimize flowshop sequencing problem
Published 2008“…Application of genetic algorithm method to optimize flow shop sequencing problem as the title of this project is the study about the method used in order to optimize flow shop sequencing problem. …”
Get full text
Get full text
Undergraduates Project Papers -
18
Adaptive interference canceller using analog algorithm with offset voltage
Published 2015“…LMS and NLMS algorithms have been used in a wide range of signal processing applications because of their simplicity in computations compared to the RLS algorithm. …”
Get full text
Get full text
Thesis -
19
Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence
Published 2011“…In addition, the mentioned block-matching algorithms are the baseline techniques that have been used to further develop all the enhanced or improved algorithms. …”
Get full text
Get full text
Get full text
Book Chapter -
20
Marketplace product recommendation using collaborative filter / Muhammad Alif Fauzan Ismail
Published 2021“…In conclusion this paper is to develop a product recommender in marketplace mobile application using Collaborative Filter and the accuracy of the algorithm is measured using Mean Absolute Error…”
Get full text
Get full text
Thesis
