Search Results - (( mobile evaluation ((a algorithm) OR (_ algorithm)) ) OR ( based interaction system algorithm ))
Search alternatives:
- interaction system »
- mobile evaluation »
- based interaction »
- system algorithm »
- a algorithm »
-
1
User interface and interactivity design guidelines of algorithm visualization on mobile platform
Published 2019“…Algorithm Visualization (AV) is a pedagogical tool that can help learners to see the animation of the step-by-step process of an algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli
Published 2021“…The main goal of this study is to create an online food ordering app using the corresponding Boyer-Moore string matching algorithm. The application evaluation process is carried out by the developer's functionality test to ensure that there are no unnecessary issues in this app, especially in the main feature. …”
Get full text
Get full text
Thesis -
3
Graphics, audio-visuals and interaction (GAI) based augmented reality (AR) system for symbian and android smartphone
Published 2012“…The development of the GAI based mobile AR system involved video capturing, image processing, mobile graphics module, audio-visual module and interactions module. …”
Get full text
Get full text
Get full text
Thesis -
4
Integrating Interactive Multimedia Objects in Mobile Augmented Reality for Sarawak Tourism
Published 2018“…Henceforth, a prototype of mobile Sarawak Tourism system was developed to evaluate the multimedia based modules functionalities testing; text, animations, audio, video, 2D/3D object interactions. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Framework for stream clustering of trajectories based on temporal micro clustering technique
Published 2018“…The algorithm assigns a life time for each newly created temporal micro clusters so that the new incoming batch of trajectories segments will interact only with the non-expired temporal micro clusters. …”
Get full text
Get full text
Thesis -
6
Mode selection mechanism to enable effective device-to-device communication system over different environments
Published 2019“…Device-to-Device (D2D) communication is an important component of the 5G mobile networks. D2D communication enables users to communicate either directly without network assistance or with minimum signalling information through a base station (BS). …”
Get full text
Get full text
Get full text
Article -
7
Mode selection mechanism to enable effective device-to-device communication system over different environments
Published 2019“…Device-to-Device (D2D) communication is an important component of the 5G mobile networks. D2D communication enables users to communicate either directly without network assistance or with minimum signalling information through a base station (BS). …”
Get full text
Get full text
Get full text
Article -
8
Vehicular ad-hoc network (vanets) for electrical vehicle charging management
Published 2025text::Thesis -
9
Performance evaluation of marker recognition algorithm for mobile augmented reality in the real environment
Published 2023“…BRISK detector, FREAK descriptor, and Hamming distance matcher algorithms are implemented in a mobile AR application in order to evaluate the AR algorithm. …”
Get full text
Get full text
Get full text
Article -
10
A comparative study on ant-colony algorithm and genetic algorithm for mobile robot planning.
Published 2024“…Focusing on routing optimization, the study evaluates Ant-Colony Optimization (ACO) and Genetic Algorithm (GA) in Mobile Robot Planning. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
-
12
A Mobile Application For Stock Price Prediction
Published 2021“…In conclusion, this project’s objectives were achieved by developing the mobile application for stock price prediction using the best time series algorithm evaluated, which is ARIMA.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
An Effectual Secured Approach Against Sybil Attacks In Wireless Networks
Published 2024journal::journal article -
14
Optimized routing algorithm for mobile multicast source in Wireless Mesh Networks
Published 2015“…Thus this paper proposes a Differential Evolution based optimized mobile multicast routing algorithm for the shared tree architecture. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
15
Performance evaluation of vertical handoff in fourth generation (4G) networks model
Published 2009Get full text
Working Paper -
16
A new Doppler Spread Estimation Algorithm Based on Zero Crossings of The Auto-correlation
Published 2010“…A comparison between our proposed algorithm and the algorithm proposed by Tevfik Yucek in term of the Normalized Mean Square Error has been shown.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim
Published 2024“…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
Get full text
Get full text
Thesis -
18
Mobile data gathering algorithms for wireless sensor networks
Published 2014“…In this research, a Mobile Data Gathering based Network Layout (MDG-NL) algorithm is proposed. …”
Get full text
Get full text
Thesis -
19
Machine learning model for performance prediction in mobile network management / Muhammad Hazim Wahid
Published 2022“…One of the major challenges when applying machine learning is to identify the best algorithm from a variety of algorithms to solve a problem. …”
Get full text
Get full text
Thesis -
20
Improving performance of mobile ad hoc networks using efficient Tactical On Demand Distance Vector (TAODV) routing algorithm
Published 2012“…It also describes the design of a novel on-demand routing algorithm. Most of the proposed algorithms use a blind ooding technique during the route discovery process. …”
Get full text
Get full text
Article
