Search Results - (( mobile evaluation a algorithm ) OR ( based information sources algorithm ))

Refine Results
  1. 1
  2. 2

    Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm by Enshaei, Mehdi

    Published 2015
    “…In this study, a new defence mechanism is proposed based on modification of the packet forwarding process, using Neighborhood Information (NI) and PT algorithm, and known as NIPT algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    MOBILE DICTIONARY by Ibrahim, Siti Nabilah

    Published 2005
    “…The system incorporates a searching algorithm, by using Hashtable function. …”
    Get full text
    Get full text
    Final Year Project
  4. 4
  5. 5

    Evolution of RF-signal cognition for wheeled mobile robots using pareto multi-objective optimization by Chin, Kim On, Teo, Jason Tze Wi

    Published 2009
    “…A mobile robot is simulated in a 3D, physics-based environment for the RF-localization behavior. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Position-based multicast routing in mobile ad hoc networks: an analytical study by Qabajeh, Mohammad M., Hassan Abdalla Hashim, Aisha, Khalifa, Othman Omran, Qabajeh, Liana K.

    Published 2012
    “…PBQMRP builds a source multicast tree guided by the geographic information of the mobile nodes, which helps in achieving more efficient multicast delivery. …”
    Get full text
    Get full text
    Article
  7. 7

    Efficient hybrid flooding scheme for ad-hoc on-demand distance vector routing protocol in MANET by Waheed, Bassam M.S.

    Published 2014
    “…Another prominent approach is the Dominant Pruning (DP) which is a distributed dominating set algorithm developed to alleviate the impact of flooding in mobile ad-hoc networks. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Static analysis of Android apps for lifecycle conformance by Zein, Samer, Salleh, Norsaremah, Grundy, John

    Published 2017
    “…A proof-of-concept software tool known as ALCI has been developed to evaluate our approach. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10

    Mitigating malicious nodes using trust and reputation based model in wireless sensor networks by Abdullah, Muhammad Daniel Hafiz

    Published 2018
    “…Most, if not all, existing models in trust and reputation domain are lack in providing sufficient behavioral-based trust information. Many of them focus too much on Quality-of-Service (QoS) types of trust information and less consideration has been put on other sources of trust information such as in Mobile Ad hoc Networks (MANETs) and Online Social Networks (OSNs). …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Performance evaluation of marker recognition algorithm for mobile augmented reality in the real environment by Siok, Yee Tan, Haslina Arshad

    Published 2023
    “…BRISK detector, FREAK descriptor, and Hamming distance matcher algorithms are implemented in a mobile AR application in order to evaluate the AR algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    A Mobile Application For Stock Price Prediction by Choy, Yi Tou

    Published 2021
    “…In conclusion, this project’s objectives were achieved by developing the mobile application for stock price prediction using the best time series algorithm evaluated, which is ARIMA.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13

    A comparative study on ant-colony algorithm and genetic algorithm for mobile robot planning. by Rajendran, Piraviendran, Othman, Muhaini

    Published 2024
    “…Focusing on routing optimization, the study evaluates Ant-Colony Optimization (ACO) and Genetic Algorithm (GA) in Mobile Robot Planning. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15
  16. 16

    Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim by Masmuhallim, Anis Athirah

    Published 2024
    “…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
    Get full text
    Get full text
    Thesis
  17. 17

    A coalition model for efficient indexing in wireless sensor network with random mobility / Hazem Jihad Ali Badarneh by Hazem Jihad , Ali Badarneh

    Published 2021
    “…In the case of random mobile sensors, a huge number of packets are generated, which exacerbated the burden of indexing the mobile sensors' reports, because of dependability on packets' attributes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    An Adaptive Switching Cooperative Source Searching And Tracing Algorithms For Underwater Acoustic Source Localization by Majid, Mad Helmi Ab.

    Published 2019
    “…To adaptively switches between the two algorithms, an adaptive switching algorithm based on a Generalized Likelihood Ratio Test (GLRT) is proposed. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Machine learning model for performance prediction in mobile network management / Muhammad Hazim Wahid by Wahid, Muhammad Hazim

    Published 2022
    “…One of the major challenges when applying machine learning is to identify the best algorithm from a variety of algorithms to solve a problem. …”
    Get full text
    Get full text
    Thesis