Search Results - (( mobile evaluation a algorithm ) OR ( based information sources algorithm ))
Search alternatives:
- information sources »
- mobile evaluation »
- based information »
- sources algorithm »
- evaluation a »
- a algorithm »
-
1
Optimized routing algorithm for mobile multicast source in Wireless Mesh Networks
Published 2015“…Simulation results show that the proposed algorithm converges and outperforms a source based tree algorithm. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
2
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…In this study, a new defence mechanism is proposed based on modification of the packet forwarding process, using Neighborhood Information (NI) and PT algorithm, and known as NIPT algorithm. …”
Get full text
Get full text
Thesis -
3
MOBILE DICTIONARY
Published 2005“…The system incorporates a searching algorithm, by using Hashtable function. …”
Get full text
Get full text
Final Year Project -
4
A new mobile malware classification for call log exploitation
Published 2024journal::journal article -
5
Evolution of RF-signal cognition for wheeled mobile robots using pareto multi-objective optimization
Published 2009“…A mobile robot is simulated in a 3D, physics-based environment for the RF-localization behavior. …”
Get full text
Get full text
Get full text
Article -
6
Position-based multicast routing in mobile ad hoc networks: an analytical study
Published 2012“…PBQMRP builds a source multicast tree guided by the geographic information of the mobile nodes, which helps in achieving more efficient multicast delivery. …”
Get full text
Get full text
Article -
7
Efficient hybrid flooding scheme for ad-hoc on-demand distance vector routing protocol in MANET
Published 2014“…Another prominent approach is the Dominant Pruning (DP) which is a distributed dominating set algorithm developed to alleviate the impact of flooding in mobile ad-hoc networks. …”
Get full text
Get full text
Get full text
Thesis -
8
ios Mobile Malware Deep Analysis And Classification For Social Media And Online Banking Exploitation
Published 2024thesis::master thesis -
9
Static analysis of Android apps for lifecycle conformance
Published 2017“…A proof-of-concept software tool known as ALCI has been developed to evaluate our approach. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
10
Mitigating malicious nodes using trust and reputation based model in wireless sensor networks
Published 2018“…Most, if not all, existing models in trust and reputation domain are lack in providing sufficient behavioral-based trust information. Many of them focus too much on Quality-of-Service (QoS) types of trust information and less consideration has been put on other sources of trust information such as in Mobile Ad hoc Networks (MANETs) and Online Social Networks (OSNs). …”
Get full text
Get full text
Get full text
Thesis -
11
Performance evaluation of marker recognition algorithm for mobile augmented reality in the real environment
Published 2023“…BRISK detector, FREAK descriptor, and Hamming distance matcher algorithms are implemented in a mobile AR application in order to evaluate the AR algorithm. …”
Get full text
Get full text
Get full text
Article -
12
A Mobile Application For Stock Price Prediction
Published 2021“…In conclusion, this project’s objectives were achieved by developing the mobile application for stock price prediction using the best time series algorithm evaluated, which is ARIMA.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
A comparative study on ant-colony algorithm and genetic algorithm for mobile robot planning.
Published 2024“…Focusing on routing optimization, the study evaluates Ant-Colony Optimization (ACO) and Genetic Algorithm (GA) in Mobile Robot Planning. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
-
15
-
16
Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim
Published 2024“…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
Get full text
Get full text
Thesis -
17
A coalition model for efficient indexing in wireless sensor network with random mobility / Hazem Jihad Ali Badarneh
Published 2021“…In the case of random mobile sensors, a huge number of packets are generated, which exacerbated the burden of indexing the mobile sensors' reports, because of dependability on packets' attributes. …”
Get full text
Get full text
Get full text
Thesis -
18
Performance evaluation of vertical handoff in fourth generation (4G) networks model
Published 2009Get full text
Working Paper -
19
An Adaptive Switching Cooperative Source Searching And Tracing Algorithms For Underwater Acoustic Source Localization
Published 2019“…To adaptively switches between the two algorithms, an adaptive switching algorithm based on a Generalized Likelihood Ratio Test (GLRT) is proposed. …”
Get full text
Get full text
Thesis -
20
Machine learning model for performance prediction in mobile network management / Muhammad Hazim Wahid
Published 2022“…One of the major challenges when applying machine learning is to identify the best algorithm from a variety of algorithms to solve a problem. …”
Get full text
Get full text
Thesis
