Search Results - (( mobile evaluation _ algorithm ) OR ( based optimization method algorithm ))*
Search alternatives:
-
1
Quality of service in mobile IP networks with parametric multi-channel routing algorithms based on linear programming approach
Published 2018“…This approach tunes the parameters of the linear programming models that are used in the other algorithms by using a dynamic element. The proposed algorithms are evaluated by considering different metrics, computation modellings, and measurements on the simulation. …”
Get full text
Get full text
Thesis -
2
-
3
A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks / Salmah Fattah
Published 2022“…The method adapts the original Non-Dominated Sorting Genetic Algorithm II (NSGA-II) by introducing a hybridisation of adaptive multi-parent crossover genetic algorithm and fuzzy dominance-based decomposition techniques. …”
Get full text
Get full text
Get full text
Thesis -
4
A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks
Published 2022“…The method adapts the original Non-Dominated Sorting Genetic Algorithm II (NSGA-II) by introducing a hybridisation of adaptive multi-parent crossover genetic algorithm and fuzzy dominance-based decomposition techniques. …”
Get full text
Get full text
Get full text
Thesis -
5
-
6
Route optimization security in mobile IPv6 wireless networks: a test-bed experience
Published 2008“…In this paper, focus is given on enhanced security scheme in terms of RO based Test-bed evaluation experiment. An enhanced security algorithm is developed on top of MIPv6 RO to secure data. …”
Get full text
Get full text
Conference or Workshop Item -
7
Security enhancement of route optimization in mobile IPv6 networks
Published 2008“…In this paper, focus is given on enhanced security scheme in terms of RO based Test-bed evaluation experiment. An enhanced security algorithm is developed on top of MIPv6 RO to secure data and prepare a safe communication between MN and CN. …”
Get full text
Get full text
Get full text
Article -
8
Delay and energy-aware routing for efficient data collection in wireless sensor networks / Ihsan Ali
Published 2024“…The hybrid method, IDBA-AFW, aims to enhance the original IDBA by incorporating the Adaptive Floyd-Warshall algorithm for graph transformation and optimization. …”
Get full text
Get full text
Get full text
Thesis -
9
Deep Learning-Driven Mobility And Utility-Based Resource Management In Mm-Wave Enable Ultradense Heterogeneous Networks
Published 2025thesis::doctoral thesis -
10
A selective approach for energy-aware video content adaptation decision-taking engine in android based smartphone
Published 2019“…Subjective evaluation by selected respondents are also has been made using Absolute Category Rating method as recommended by ITU to evaluate EnVADE algorithm in term of QoE. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
A selective approach for energy-aware video content adaptation decision-taking engine in android based smartphone
Published 2019“…Subjective evaluation by selected respondents are also has been made using Absolute Category Rating method as recommended by ITU to evaluate EnVADE algorithm in term of QoE. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Electroencephalogram signal interpretation system for mobile robot
Published 2013“…After 30 GA runs, the optimal four sets of electrodes are chosen based on their coefficient of determination or r² values, where higher values contributes to higher repetition rates. …”
Get full text
Get full text
Thesis -
13
Mobility-aware Offloading Decision For Multi-access Edge Computing In 5g Networks
Published 2024journal::journal article -
14
Artificial Bee Colony for Minimizing the Energy Consumption in Mobile Ad Hoc Network
Published 2019“…The aim of this paper is to find the best possible route from the source to the destination based on a method inspired by the searching behaviour of bee colonies, i.e. artificial bee colony (ABC) algorithm. …”
Get full text
Get full text
Article -
15
Optimize and deploy machine learning algorithms on embedded devices for manufacturing applications
Published 2025“…In recent studies, we seen developers and researchers proposing solutions on deep learning algorithms like YOLO, EfficientNet, CNN, MobileNet etc. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Performance evaluation of Location-Sensitive Handoff using positioning method / Azuwa Ali and Saiful Fadzli Salian
Published 2009“…This project investigate the performance of handoff process with the help of location information which is called Location-Sensitive Handoff (L-SH) using the location positioning method. Location positioning method chosen in L-SH is Observed-Time Difference of Arrival (OTDOA). …”
Get full text
Get full text
Research Reports -
17
Traffic signal control with deep reinforcement learning
Published 2025“…Comprehensive experiments are conducted on Simulation of Urban Mobility (SUMO) to evaluate the effectiveness of the algorithm.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Modeling and Analysis of New Hybrid Clustering Technique for Vehicular Ad Hoc Network
Published 2023“…Firstly, RK-Means creates multi-groups of vehicles using a covering rough set based on effective parameters. Secondly, the K-value-calculating algorithm computes the optimal number of clusters. …”
Article -
19
Controller placement problem in the optimization of 5G based SDN and NFV architecture
Published 2021“…In addition, energy savings of up to 70% are achieved compared to the proposed Dijkstra-based energy-aware algorithms.…”
Get full text
Get full text
Thesis -
20
Task offloading paradigm in mobile edge computing-current issues, adopted approaches, and future directions
Published 2023“…For each journal paper, the detailed information of the work area, targeted issue, formulation technique, optimization approach, adopted algorithms, evaluation techniques, performance matrices, dataset, utilized tools, and framework are extracted and analyzed using manual and automatic coding. …”
Get full text
Get full text
Article
