Search Results - (( mobile evaluation focus algorithm ) OR ( panel optimization svm algorithm ))
Search alternatives:
- panel optimization »
- mobile evaluation »
- evaluation focus »
- optimization svm »
- focus algorithm »
- svm algorithm »
-
1
A comparative study on ant-colony algorithm and genetic algorithm for mobile robot planning.
Published 2024“…This paper investigates the optimization of routing for robotics vehicles in automated warehouses in Malaysia. Focusing on routing optimization, the study evaluates Ant-Colony Optimization (ACO) and Genetic Algorithm (GA) in Mobile Robot Planning. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Optimized routing algorithm for mobile multicast source in Wireless Mesh Networks
Published 2015“…Mobility considerations in multicast algorithm design usually focus issues of mobile receivers while few researches emphasize on mobile multicast sources issues. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
3
A new mobile malware classification for SMS exploitation
Published 2024“…This research has developed a new mobile malware classification for Android smartphone using a covering algorithm. …”
Conference Paper -
4
Performance comparison between genetic algorithm and ant colony optimization algorithm for mobile robot path planning in global static environment / Nohaidda Sariff
Published 2011“…Subsequently, both algorithms were applied to the test environments. Finally, the performances of both algorithms were analyzed and evaluated based on the required criteria. …”
Get full text
Get full text
Thesis -
5
-
6
Age And Gender Recognition Mobile App
Published 2023“…Through reviewing and evaluate the existing age and gender recognition mobile apps and their deep learning algorithm, the study found the number of existing age and gender recognition mobile app is very less. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
7
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
Published 2024“…Comparisons of the evaluation results have shown improvements in the detection and removal of XSS vulnerabilities in desktop and mobile web applications. …”
Get full text
Get full text
Get full text
Thesis -
8
Secure mobile AES encryptor (SMAE)
Published 2016“…This application will focus more on the user of the Android operating systems based mobile phone users. …”
Get full text
Get full text
Undergraduates Project Papers -
9
A comprehensive overview of classical and modern route planning algorithms for self-driving mobile robots
Published 2022“…The following review analyses and compares 200 articles from two databases, Scopus and IEEE Xplore, and selects 60 articles as references from those articles. This evaluation focuses mostly on the accuracy of the different path-planning algorithms. …”
Get full text
Get full text
Get full text
Article -
10
Permission-based fault tolerant mutual exclusion algorithm for mobile Ad Hoc networks
Published 2015“…This study focuses on resolving the problem of mutual exclusion in mobile ad hoc networks. …”
Get full text
Get full text
Thesis -
11
Optimizing the performance of mobile malware detection using the indexing rule
Published 2024journal::journal article -
12
A dynamic energy savvy routing algorithm for mobile Ad-hoc and sensor networks
Published 2017“…Mobile Ad-hoc and Sensor Networks (MASNETs) are energy constrained networks which have been the focus of many recent research and development efforts. …”
Get full text
Get full text
Get full text
Article -
13
-
14
NLP- based for providing mental health support in mobile application / Muhammad Amirul Roslan
Published 2025“…This project focuses on developing a mobile application to provide comprehensive mental health support using advanced Natural Language Processing (NLP) techniques. …”
Get full text
Get full text
Thesis -
15
Route optimization security in mobile IPv6 wireless networks: a test-bed experience
Published 2008“…RO greatly increases the security risk. In this paper, focus is given on enhanced security scheme in terms of RO based Test-bed evaluation experiment. …”
Get full text
Get full text
Conference or Workshop Item -
16
Security enhancement of route optimization in mobile IPv6 networks
Published 2008“…Mobile IPv6 (MIPv6) allows Mobile Node (MN) to be always addressable by its home address. …”
Get full text
Get full text
Get full text
Article -
17
Design and evaluation on adaptive fuzzy speed control of mobile robot
Published 2011“…Both data acquisition and control algorithm are developed by using LabVIEW. A four-wheel mobile robot, PUTRABOT2, is used to conduct the experiments. …”
Get full text
Get full text
Thesis -
18
Analysis the components of SNOW 3G and ZUC ciphers in mobile systems
Published 2018“…The SNOW 3G and ZUC ciphers algorithms are classified as stream ciphers, used as confidentiality algorithms in third and fourth generations of Mobile Technologies (3G-UMTS and 4G- LTE). …”
Get full text
Get full text
Get full text
Article -
19
Characterization Of Cooperative Control For Multiple Non-Holonomic Wheeled Mobile Robots To Achieve Formation Tracking
Published 2017“…Distributed control for cooperative system is an emerging research �eld in control system. This research focuses on characterization of the distributed control algorithm in solving formation tracking for multiple non-holonomic wheeled mobile robots. …”
Get full text
Get full text
Thesis -
20
Enhancement Of Aodv Routing Protocol In Masnets
Published 2015“…In this research work, through extensive simulation, we have evaluated the capability of Ad-hoc On Demand Distance Vector (AODV) routing protocol on how far it can react to different mobility duration of mobile nodes in MASNETs. …”
Get full text
Get full text
Proceeding
