Search Results - (( mobile application usage algorithm ) OR ( _ applications usage algorithm ))
Search alternatives:
- applications usage »
- application usage »
- usage algorithm »
- _ applications »
-
1
Embedded parallel distributed artificial intelligent processors for adaptive beam forming in WCDMA system
Published 2023“…Adaptive antenna has dynamic beam to cater for users' needs and provides better capacity for mobile communication but requires more intelligent and advance beam forming algorithm such as genetic algorithm. …”
Conference paper -
2
Context Aware Handover Algorithms For Mobile Positioning Systems
Published 2014“…Battery usage of the proposed solution is less than one third of the battery usage of two other applications. …”
Get full text
Get full text
Get full text
Article -
3
IMPLEMENTATION OF GRAPH BASED PATH PLANNING ALGORITHMS FOR INDOOR NAVIGATION
Published 2018“…Thus, the A* algorithm is implemented in a small mobile robot, this is to see its effectiveness in real world application. …”
Get full text
Get full text
Final Year Project -
4
WCDMA teletraffic performance improvement via power resource optimization using distributed parallel genetic algorithm
Published 2023Conference paper -
5
Dynamic characterized genetic algorithm for adaptive beam forming in WCDMA system
Published 2005Get full text
Get full text
Get full text
Proceeding Paper -
6
-
7
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…Mostly, it attacks Android due to its popularity and high usage among end users. Every day, more and more malicious mobile applications (apps) with the botnet capability have been developed to exploit end users' smartphones. …”
Proceedings Paper -
8
Novel scheduling algorithm for optimizing real-time multimedia performance in Long-Term Evolution Advanced
Published 2017“…This paper proposes a packet scheduling algorithm known as Novel Scheduling for usage in the downlink LTE-A. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
9
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
10
RSA algorithm performance in short messaging system exchange environment
Published 2011“…Short Message Service (SMS) is a widely service for brief communication.With the rise of mobile usage it has become a popular tool for transmitting sensitive information. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
An energy based cluster head selection unequal clustering algorithm with dual sink (ECH-DUAL) for continuous monitoring applications in wireless sensor networks
Published 2018“…In this work, an energy based cluster head selection unequal clustering algorithm (ECH-DUAL) using dual (static and mobile) sink is proposed. …”
Get full text
Get full text
Article -
12
Video content adaptation based on user preferences and network bandwidth / Badariyah Bakhtiar
Published 2007“…System architecture was designed and implement in video adaptation algorithms development. Through the algorithm, rule-based technique was used. …”
Get full text
Get full text
Thesis -
13
Resource-Efficient Coverage Path Planning for UAV-Based Aerial IoT Gateway
Published 2023“…As a result, the Energy Efficient Coverage Path Planning (EECPP) algorithm has been proposed. The EECPP is composed of two algorithms: the Stop Point Prediction Algorithm using K-Means, and Path Planning Algorithm using Particle Swarm Optimization. …”
Get full text
Get full text
Get full text
Article -
14
-
15
Sentiment Analysis on Users' Satisfaction for Mobile Banking Apps in Malaysia
Published 2022“…Data classification has become the region of interest in Data Mining research as it indicates the arising of technology's application that leads to increment data usage. In this research, collection data and experiments are conducted, and results are shown. …”
Get full text
Get full text
Get full text
Article -
16
-
17
-
18
Design of monitoring and control system of electricity power limiter using internet of things
Published 2025“…Users can access information related to electricity usage via web-based or mobile applications that provide data display in the form of a reports. …”
Get full text
Get full text
Book Section -
19
A new mobile malware classification for call log exploitation
Published 2024journal::journal article -
20
