Search Results - (( mobile application new algorithm ) OR ( _ application ((out algorithm) OR (cpdod algorithm)) ))
Search alternatives:
- application new »
- cpdod algorithm »
- new algorithm »
- out algorithm »
-
1
-
2
Graphical user authentication algorithm for mobile banking user
Published 2018Get full text
Get full text
Get full text
Article -
3
A generalized laser simulator algorithm for mobile robot path planning with obstacle avoidance
Published 2022“…This paper aims to develop a new mobile robot path planning algorithm, called generalized laser simulator (GLS), for navigating autonomously mobile robots in the presence of static and dynamic obstacles. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Mobile game application development using evolutionary algorithms
Published 2014“…Evolutionary Algorithms have never been used on mobile applications, thus it gives a novel idea of utilizing Evolutionary Algorithms in developing applications typically in games for mobile platforms. …”
Get full text
Get full text
Get full text
Thesis -
5
Smart and energy aware routing for the internet of mobile things
Published 2021Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
-
7
Mobile Malware Classification via System Calls and Permission for GPS Exploitation
Published 2024Article -
8
-
9
Simulation and Design of an Intelligent Mobile Robot for Fire Fighting
Published 2003“…Keywords: (Fuzzy logic control, mobile robot, part recognition algorithms)…”
Get full text
Get full text
Thesis -
10
Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing
Published 2023“…Furthermore, the proposed techniques based on the QLearning algorithm do not consider context-based actions. Thus, these techniques are unable to detect failures that occur due to the improper use of context data, which is becoming an increasingly common issue in mobile applications nowadays. …”
Get full text
Get full text
Get full text
Thesis -
11
Enhanced Privacy Protection Against Location-Dependent Attacks in Location Based Services Using Spatial Cloaking
Published 2020“…Through maximum sized cliques and dummy query generation, more user queries get cloaked within a reasonable amount of time, thereby providing cloaked within a reasonable amount of time, thereby providing better privacy protection when using LBS applications. The experimental results showed that the proposed cloaking algorithm out performed existing algorithms such as IClique, OptClique and MMBClique in terms of its cloaking success rate and processing time.…”
Get full text
Get full text
Article -
12
Enhanced dynamic source routing (En-Dsr) with QOS based routing for IPV6 in ad Hoc Networks
Published 2013“…Without any centralized management system, mobile nodes use routing algorithm to perform the routing process from finding a route to sending data to their recipients. …”
Get full text
Get full text
Thesis -
13
Brain Machine Interface Controlled Robot Chair
Published 2010“…The BMI controls the joystick of the robot chair using a shared control algorithm. Real-time experiments are also presented using 10 trained and 5 untrained subjects to validate the applicability of the brain machine interface. …”
Get full text
Thesis -
14
The classification of wink-based eeg signals by means of transfer learning models
Published 2021“…Nonetheless, upon carrying out a robustness test on new data, it was demonstrated that the CWT-NasNetMobile-kNN pipeline yielded the best performance. …”
Get full text
Get full text
Thesis -
15
Traffic offloading and its application in CRRM
Published 2014Get full text
Get full text
Conference or Workshop Item -
16
African Buffalo Optimization: A Swarm-Intelligence Technique
Published 2015Get full text
Get full text
Get full text
Article -
17
PoshPick / Aiman Ariff Suliman ... [et al.]
Published 2023“…In this New Product Development (NPD) report, we came out with a solution to this problem which is by developing a blueprint by using mobile applications. …”
Get full text
Get full text
Entrepreneurship Project -
18
Enhancement Of Aodv Routing Protocol In Masnets
Published 2015“…Nowadays, most of researchers working on Wireless Sensor Networks (WSNs) focus on Mobile Ad-hoc and Sensor Networks (MASNETs) due to their wide range of potential applications ranging from underwater monitoring to search and rescue mobile robotics applications. …”
Get full text
Get full text
Proceeding -
19
Adaptive manet OLSR routing protocol for optimal route selection in high dynamic network
Published 2020“…To provide the necessary robustness, a new Cluster-based Adoptive Cooperative Algorithm (CACA) for VANET is introduced to improve the scalability of the network and reduce control overhead. …”
Get full text
Get full text
Thesis -
20
