Search Results - (( mobile evaluation based algorithm ) OR ( based information services algorithm ))
Search alternatives:
- information services »
- mobile evaluation »
- based information »
- evaluation based »
-
1
Q-learning based vertical handover decision algorithm in LTE-A two-tier macrocell-femtocell systems / Ammar Bathich
Published 2019“…Next generation mobile systems require improved capacity and proper quality assurance for services. …”
Get full text
Get full text
Thesis -
2
WCDMA forward link capacity improvement by using adaptive antenna with genetic algorithm assisted MDPC beamforming technique
Published 2023“…User mobility is taken into account to provide a combined evaluation of Radio Resource Management (RRM). …”
Article -
3
Automated call receiving and forwarding mechanism for supporting integrated disaster management system
Published 2014“…Based on the evaluation, it is shown that the proposed algorithm are able to shorten the length of time between and incident happens and relevant agencies being dispatched to the event.…”
Get full text
Get full text
Get full text
Article -
4
Position-based multicast routing in mobile ad hoc networks: an analytical study
Published 2012“…This protocol depends on the location information of the multicast members which is obtained using a location service algorithm. …”
Get full text
Get full text
Article -
5
Pet hero pet care services mobile application recommendation system using content-based filtering / Farah ‘Aliya Jasmin
Published 2023“…Therefore, the introduction of the Pet Hero Pet Care Services Mobile Application using Content-Based Filtering techniques with TF-IDF algorithm can help overcome these challenges. …”
Get full text
Get full text
Thesis -
6
WCDMA forward link capacity improvement by using adaptive antenna with genetic algorithm assisted MDPC beamforming technique
Published 2006“…User mobility is taken into account to provide a combined evaluation of Radio Resource Management (RRM). …”
Get full text
Get full text
Get full text
Article -
7
Seamless vertical handover technique for vehicular ad-hoc networks using artificial bee colony-particle swarm optimisation
Published 2019“…Firstly, we proposed a multi-criteria artificial bee colony hybrid with particle swarm optimisation algorithm (MC ABC-PSO) for evaluating the information gathered from the mobile nodes in the handover. …”
Get full text
Get full text
Thesis -
8
-
9
Automated call receiving and forwarding mechanism for supporting integrated disaster management system
Published 2014“…Based on the evaluation, it is shown that the proposed algorithm are able to shorten the length of time between and incident happens and relevant agencies being dispatched to the event.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
10
Task offloading paradigm in mobile edge computing-current issues, adopted approaches, and future directions
Published 2023“…For each journal paper, the detailed information of the work area, targeted issue, formulation technique, optimization approach, adopted algorithms, evaluation techniques, performance matrices, dataset, utilized tools, and framework are extracted and analyzed using manual and automatic coding. …”
Get full text
Get full text
Article -
11
Xcast Based Routing Protocol For Push To Talk Application In Mobile Ad Hoc Networks
Published 2011“…In this thesis, a Priority XCAST based routing protocol (P-XCAST) is proposed for mobile ad-hoc networks to minimize bandwidth consumption. …”
Get full text
Get full text
Thesis -
12
Xcast Based Routing Protocol For Push To Talk Application In Mobile Ad Hoc Networks
Published 2011“…In this thesis, a Priority XCAST based routing protocol (P-XCAST) is proposed for mobile ad-hoc networks to minimize bandwidth consumption. …”
Get full text
Get full text
Thesis -
13
Performance evaluation of seed values and pause times over high speed Wireless Campus Network in IEEE802.11e
Published 2014“…Due to this randomness of back-off window algorithm to provide probabilistic QoS to satisfy the multimedia traffic through the network, the random mobility model can reduce the network performance. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
Adaptive manet OLSR routing protocol for optimal route selection in high dynamic network
Published 2020“…To provide the necessary robustness, a new Cluster-based Adoptive Cooperative Algorithm (CACA) for VANET is introduced to improve the scalability of the network and reduce control overhead. …”
Get full text
Get full text
Thesis -
15
ios Mobile Malware Deep Analysis And Classification For Social Media And Online Banking Exploitation
Published 2024thesis::master thesis -
16
Mitigating malicious nodes using trust and reputation based model in wireless sensor networks
Published 2018“…Most, if not all, existing models in trust and reputation domain are lack in providing sufficient behavioral-based trust information. Many of them focus too much on Quality-of-Service (QoS) types of trust information and less consideration has been put on other sources of trust information such as in Mobile Ad hoc Networks (MANETs) and Online Social Networks (OSNs). …”
Get full text
Get full text
Get full text
Thesis -
17
Hotel recommendation system using machine learning
Published 2025“…The future work includes expanding the dataset, refining the recommendation algorithm, using natural language processing techniques with the addition of multilingual reviews, and deploying the system as a user-friendly application or mobile application.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
QoS BASED ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORK
Published 2012“…Furthermore, to minimize delay in mobile sink data gathering, the mobile sink is moved throughout the network based on the priority messages at the nodes. …”
Get full text
Get full text
Thesis -
19
An enhanced android botnet detection approach using feature refinement
Published 2019“…This classification is performed on the base of botnet related unique patterns of additional requested features namely permissions, activities, broadcast receivers, services and API calls. …”
Get full text
Get full text
Thesis -
20
