Search Results - (( mobile evaluation a algorithm ) OR ( rate simulation model algorithm ))
Search alternatives:
- mobile evaluation »
- rate simulation »
- model algorithm »
- evaluation a »
- a algorithm »
-
1
Performance evaluation of vertical handoff in fourth generation (4G) networks model
Published 2009Get full text
Working Paper -
2
Quality of service in mobile IP networks with parametric multi-channel routing algorithms based on linear programming approach
Published 2018“…The proposed algorithms are evaluated by considering different metrics, computation modellings, and measurements on the simulation. …”
Get full text
Get full text
Thesis -
3
Quality of service management algorithms in WiMAX networks
Published 2015“…Simulation have been extensively used to evaluate the proposed algorithm. …”
Get full text
Get full text
Thesis -
4
An efficient network mobility management for a 6LoWPAN mobile network in hospital environments
Published 2017“…The effects of three design parameters, namely number of mobile network nodes (MNNs), number of handovers, and MNN packet generation rate in NEMO are evaluated. …”
Get full text
Get full text
Thesis -
5
Evaluating mobility management models for content forwarding in named data networking environments
Published 2019“…A detailed analysis of the famous mobility model such as the Random Waypoint mobility and Constant Velocity were computed to determine the mobility rate of the NDN mobile router. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
6
Deep Learning-Driven Mobility And Utility-Based Resource Management In Mm-Wave Enable Ultradense Heterogeneous Networks
Published 2025thesis::doctoral thesis -
7
A hybrid sampling-based path planning algorithm for mobile robot navigation in unknown environments
Published 2013“…Finally, an adaptive neuro-fuzzy inference system (ANFIS) was designed which constructs and optimizes a fuzzy logic controller using a given dataset of input/output variables in order to increase the optimality and stability rates of the proposed path planning algorithm. The simulation and comparison results indicate the superiority of the proposed algorithm. …”
Get full text
Get full text
Thesis -
8
Deep Learning Based image segmentation for expensive soil desiccation crack recognition and qualification
Published 2025“…Deep learning models, including U-Net, Res-UNet, and DeepLabv3+ with pre-trained backbones such as MobileNetV2, ResNet-18, ResNet-50, and Xception, were trained and evaluated along side a traditional Otsu's thresholding method as the baseline for crack detection and segmentation. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Dynamic and adaptive execution models for data stream mining applications in mobile edge cloud computing systems / Muhammad Habib Ur Rehman
Published 2016“…Considering the complexity factors, existing literature proposes static execution models for MDSM applications. The execution models are based on either standalone mobile devices, mobile-to-mobile, mobile-to-edge, or mobile-to-cloud communication models. …”
Get full text
Get full text
Get full text
Thesis -
10
Adaptive manet OLSR routing protocol for optimal route selection in high dynamic network
Published 2020“…A suitable algorithm called Link Stability Aware selection Multi Points Relay (LSA-MPR) is introduced, which find a route that satisfies constraints on multiple objectives for selecting the next hop as a relay node designed especially for VANETs, it finds a route that satisfies the constraints on multiple objectives based on Received Signal Strength Indicator (RSSI) and Signal to Interference-Noise Rate (SINR). …”
Get full text
Get full text
Thesis -
11
Development of a new robust hybrid automata algorithm based on surface electromyography (SEMG) signal for instrumented wheelchair control
Published 2020“…This method would be a control method to activate power assist system and selected based on conditions set in the algorithm. …”
Get full text
Get full text
Thesis -
12
Optimising Connectivity and Energy : The Future of LoRaWAN Routing Protocols for Mobile IoT Applications
Published 2025“…This study provides a comprehensive review of energy-efficient routing algorithms for LoRaWAN in mobile IoT applications. …”
Get full text
Get full text
Get full text
Article -
13
Channel Modelling and Estimation in Multiple-Input Multiple-Output Orthogonal Frequency Division Multiplexing Wireless Communication Systems
Published 2008“…For this target, a geometrically-based three-dimensional (3-D) scattering MIMO channel model is developed. …”
Get full text
Get full text
Thesis -
14
Channel Modeling and Direction-of-Arrival Estimation in Mobile Multiple-Antenna Communication Systems
Published 2005“…The model can be applied to evaluate smart antenna systems and beamforming algorithms in the uplink by generating uncorrelated multipaths Rayleigh fading waveforms with certain spatio-temporal correlation and spatial coordinates relative to base stations to simulate received signals from mobiles and interferers. …”
Get full text
Get full text
Thesis -
15
Spatio-Temporal processing for Optimum Uplink-Downlink WCDMA Systems
Published 2008“…The performances of the Beam former-Rake receiver are evaluated in this channel model as a function of the number of antenna elements and RAKE fingers, in which are evaluated for the uplink WCDMA system. …”
Get full text
Get full text
Thesis -
16
A QoS Aware Cluster Head Selection and Hybrid Cryptography Routing Protocol for Enhancing Efficiency and Security of VANET
Published 2022“…The simulator consists of a network model, a load model, and an attack model. …”
Get full text
Get full text
Article -
17
A QoS Aware Cluster Head Selection and Hybrid Cryptography Routing Protocol for Enhancing Efficiency and Security of VANETs
Published 2023“…The simulator consists of a network model, a load model, and an attack model. …”
Get full text
Get full text
Article -
18
Mitigating malicious nodes using trust and reputation based model in wireless sensor networks
Published 2018“…However, many of existing trust and reputation models in WSNs are insecure due to inaccurate node’s trustworthiness evaluation which cause node to accidentally choose a malicious node during the data forwarding process. …”
Get full text
Get full text
Get full text
Thesis -
19
A QoS Aware Cluster Head Selection and Hybrid Cryptography Routing Protocol for Enhancingm Efficiency and Security of VANET
Published 2022“…The simulator consists of a network model, a load model, and an attack model. …”
Get full text
Get full text
Article -
20
Utilization of canny and velocity bunching algorithms for modelling shoreline change
Published 2006“…Then, rate of shoreline is simulated by using velocity bunching model. …”
Get full text
Get full text
Conference or Workshop Item
