Search Results - (( mobile applications a algorithm ) OR ( its application using algorithm ))*
Search alternatives:
- mobile applications »
- its application »
- using algorithm »
- applications a »
- a algorithm »
-
1
Performance evaluation of PID controller optimisation for wheel mobile robot using Bat based optimisation algorithm
Published 2022“…In this study, a new proposed hybrid optimization algorithm, called Extended Bat Algorithm (EBA) is used for optimizing the PID controller for the wheel mobile robot. …”
Get full text
Get full text
Book Chapter -
2
-
3
A study of mobile IP and its security aspects in a LAN environment / Suhaila Che Ismail
Published 1998“…Mobility allows mobile node to communicate even distances away without restarting any applications in use. …”
Get full text
Get full text
Thesis -
4
Fuzzy Logic Based Self-Adaptive Handover Algorithm for MobileWiMAX.
Published 2013“…The conventional handover decision algorithm in mobile WiMAX is based on a single criterion, which usually uses the received signal strength indicator (RSSI) as an indicator, with the other fixed handover parameters such as handover threshold and handover margin. …”
Get full text
Get full text
Article -
5
A Proposed False Report Identification Algorithm for a Mobile Application in the IoT Environment
Published 2024Proceedings Paper -
6
PID controller design for mobile robot using Bat Algorithm with Mutation (BAM)
Published 2019“…By definition, a mobile robot is a type of robot that has capability to move in a certain kind of environment and generally used to accomplish certain tasks with some degrees of freedom (DoF). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
8
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…As a result, 16 permissions and 31 API calls that are most related with mobile botnet have been extracted using feature selection and later classified and tested using machine learning algorithms. …”
Proceedings Paper -
9
Fast handover algorithm for hierarchical mobile IPv6 macro-mobility management
Published 2003Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
10
Mobile game application development using evolutionary algorithms
Published 2014“…Evolutionary Algorithms have never been used on mobile applications, thus it gives a novel idea of utilizing Evolutionary Algorithms in developing applications typically in games for mobile platforms. …”
Get full text
Get full text
Get full text
Thesis -
11
Neighbour-based on-demand routing algorithms for mobile ad hoc networks
Published 2017“…In terms of the applications, The DCFP is more suitable to be used for education applications, while the SNBR is a good algorithm designed to be used for rescue system as data and energy is the main concern. …”
Get full text
Get full text
Get full text
Thesis -
12
Adaptive fault tolerant checkpointing algorithm for cluster based mobile Ad Hoc networks
Published 2015“…This has made possible to create a distributed mobile computing application and has also brought several new challenges in distributed algorithm design. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
Mobile data gathering algorithms for wireless sensor networks
Published 2014“…In this research, a Mobile Data Gathering based Network Layout (MDG-NL) algorithm is proposed. …”
Get full text
Get full text
Thesis -
14
-
15
MAZE ROBOT: APPLYING AUTONOMOUS VEHICLE NAVIGATION ALGORITHM WITH EVENT-DRIVEN PROGRAMMING
Published 2011Get full text
Get full text
Final Year Project -
16
-
17
-
18
-
19
Text spam messages classification using Artificial Immune System (AIS) algorithms
Published 2024thesis::master thesis -
20
Cloudlet deployment and task offloading in mobile edge computing using variable-length whale and differential evolution optimization and analytical hierarchical process for decisio...
Published 2023“…Mobile edge computing (MEC) is a well-known technique to support delay-sensitive applications at the edge of mobile networks. …”
Get full text
Get full text
Thesis
