Search Results - (( mobile detection based algorithm ) OR ( a communication system algorithm ))
Search alternatives:
- mobile detection »
- system algorithm »
- detection based »
- a communication »
-
1
A new SMS spam detection method using both Content-Based and non Content-Based features
Published 2024Conference Paper -
2
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
Get full text
Get full text
Get full text
Thesis -
3
Permission-based fault tolerant mutual exclusion algorithm for mobile Ad Hoc networks
Published 2015“…Token-based algorithms depend on circulation of a specific message known as token. …”
Get full text
Get full text
Thesis -
4
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…The proposed algorithm employs a combined model that uses two different measures (nonconformity metric measures and Local Distance-based Outlier Factor (LDOF)) to improve its detection ability. …”
Get full text
Get full text
Get full text
Thesis -
5
A study on obstacle detection for IoT based automated guided vehicle (AGV)
Published 2022“…Therefore, an IoT system is developed to allow a flexible wireless communication among mobile robots in an indoor industrial environment. …”
Get full text
Get full text
Get full text
Article -
6
Mobile Malware Classification via System Calls and Permission for GPS Exploitation
Published 2024Article -
7
WURFL detection engine using cosine string similarity algortlhm / Illiasaak Ahmad ... [et al.]
Published 2013“…Our method is based on three stages: 1) define the problem formulation for device heterogeneity; 2) model a mathematical equation for device heterogeneity detection; 3) develop a cloud-based device heterogeneity detection algorithm. …”
Get full text
Get full text
Research Reports -
8
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
9
-
10
Location-Based Approach for Route Maintenance in Dynamic Source Routing Protocol
Published 2008“…The proposed algorithms based on node location information that may be collected through Global Positioning System (GPS). …”
Get full text
Get full text
Thesis -
11
An Efficient Route Selection Based on AODV Algorithm for VANET
Published 2016“…The accident detection system which based on Global Positioning System (GPS) and Global System for Mobile communication (GSM) can be accomplish though one or several sensors, the system can gathers the information and coordinates of accident spot then send this data to the rescues services center over a network link in shortest time, In this paper, we propose enhance system that composed of a GPS receiver, Vibration sensor, GSM Modem and integrated with Vehicular AD-Hoc Network (VANET). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
An Efficient Route Selection based on AODV Algorithm for VANET
Published 2016“…The accident detection system which based on Global Positioning System (GPS) and Global System for Mobile communication (GSM) can be accomplished though one or several sensors, the system can gather the information and coordinates of accident spot, then send this data to the rescue services center over a network link in the shortest time, In this paper, we propose an enhanced system that composed of a GPS receiver, Vibration sensor, GSM Modem and integrated with Vehicular AD-Hoc Network (VANET). …”
Get full text
Get full text
Get full text
Article -
13
Impact of multiplay transmission in mobile WIMAX using overlay scanning: article / Akmarya Syukhairilnisah Mohd Akhir
Published 2014“…There are several issues to impact the base station handover is a serious problem in the mobile communication system. …”
Get full text
Get full text
Article -
14
Game theoretic approach for exhaustive tactical modelling of node misbehavior in adhoc networking based IOT paradigm/P-RIGS18-020-0020
Published 2019“…On comparing our results with the existing systems, it was found that the proposed algorithm performed better in the detection of malicious nodes, throughput, false positive rate and detection of attacks.…”
Get full text
Get full text
Monograph -
15
Impact of multiplay transmission in mobile WIMAX using overlay scanning / Akmarya Syukhairilnisah Mohd Akhir
Published 2014“…There are several issues to impact the base station handover is a serious problem in the mobile communication system. …”
Get full text
Get full text
Thesis -
16
A novel bio-inspired routing algorithm based on ACO for WSNs
Published 2019“…The proposed algorithm has been simulated and verified using MATLAB and the simulation results demonstrate that new ACO based algorithm achieved improved performance, about 30% improvement compared with the traditional ACO algorithm, and faster convergence to determine the best cost route, and recorded an improvement in the energy consumption of the nodes per transmission.…”
Get full text
Get full text
Get full text
Get full text
Article -
17
Comprehensive review of drones collision avoidance schemes: challenges and open issues
Published 2024“…Our evaluation reveals significant challenges in current drone collision prevention algorithms. Despite advancements, critical UAV network and communication challenges are often overlooked, prompting a reliance on simulation-based research due to cost and safety concerns. …”
Get full text
Get full text
Get full text
Article -
18
Improving spectrum efficiency on cognitive radio spectrum sensing with enhanced diversity concept / Mohsen Akbari
Published 2016“…The frequency spectrum is a scarce resource for wireless communication. Due to the rapid advances in a wireless communication system, there has been an increasing demand for the new wireless services in both the used and unused Electromagnetic spectrum. …”
Get full text
Get full text
Thesis -
19
Ethereum blockchain-based three factor authentication and multi-contract access control for secure smart home environment in 5G networks
Published 2025“…The registration contract is performed by a certificate authority, and the key is generated using the Enhanced Elliptic Curve Digital Signature (EECDS) algorithm which improves the secure and private communication between the users, IoT devices, and edge-gateway. …”
Article -
20
