Search Results - (( mobile evaluation method algorithm ) OR ( based information ((a algorithm) OR (_ algorithm)) ))
Search alternatives:
- mobile evaluation »
- based information »
- method algorithm »
- a algorithm »
-
1
Neighbour-based on-demand routing algorithms for mobile ad hoc networks
Published 2017“…The proposed algorithm totally eliminates the need for fixed threshold values through the use of a novel formula that can easily estimate the node density and replace the fixed threshold value based on the neighbor information. …”
Get full text
Get full text
Get full text
Thesis -
2
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…In this study, a new defence mechanism is proposed based on modification of the packet forwarding process, using Neighborhood Information (NI) and PT algorithm, and known as NIPT algorithm. …”
Get full text
Get full text
Thesis -
3
A comprehensive overview of classical and modern route planning algorithms for self-driving mobile robots
Published 2022“…Classical or traditional methods, such as Roadmaps (Visibility Graph and Voronoi Diagram), Potential Fields, and Cell Decomposition, and modern methodologies such as heuristic-based (Dijkstra Method, A* Algorithms, and D* Algorithms), metaheuristics algorithms (such as PSO, Bat Algorithm, ACO, and Genetic Algorithm), and neural systems such as fuzzy neural networks or fuzzy logic (FL) and Artificial Neural Networks (ANN) are described in this report. …”
Get full text
Get full text
Get full text
Article -
4
An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias
Published 2017“…Therefore, this project has proposed a method called token based alert notification. …”
Get full text
Get full text
Thesis -
5
Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli
Published 2021“…The manual method often has a lack of knowledge that the menu that shows the customer does not provide any information that customers need, such as an image of the food or ingredients used in the menu. …”
Get full text
Get full text
Thesis -
6
Home buyer assistant using artificial bee colony algorithm / Muhammad Izzat Azri Azman
Published 2017“…This project used Artificial Bee Colony Algorithms (ABC) by adapting the food foraging behaviour of bee in honey bee and find a suitable house for home buyer based on their requirement. …”
Get full text
Get full text
Thesis -
7
Mobility-aware Offloading Decision For Multi-access Edge Computing In 5g Networks
Published 2024journal::journal article -
8
Efficient management of Top-k queries over Uncertain Data Streams with dynamic Sliding Window Model
Published 2024“…Current research on tackling uncertainty revolves around creating specifically tailored algorithms that can operate in the presence of value uncertainty using both a count-based and a time-based approach. …”
Get full text
Get full text
Get full text
Thesis -
9
Reduced Set Kernel Principal Component Analysis (Rskpca) Algorithm for Palm Print Based Mobile Biometric System
Published 2015“…As a result, the RSKPCA only extracts the most relevant and important information from a dataset. 2400 palm print images which were collected from three types of android mobile are employed. …”
Get full text
Get full text
Thesis -
10
Seamless vertical handover technique for vehicular ad-hoc networks using artificial bee colony-particle swarm optimisation
Published 2019“…Firstly, we proposed a multi-criteria artificial bee colony hybrid with particle swarm optimisation algorithm (MC ABC-PSO) for evaluating the information gathered from the mobile nodes in the handover. …”
Get full text
Get full text
Thesis -
11
Multi-sensor fusion based on multiple classifier systems for human activity identification
Published 2019“…To provide compact feature vector representation, we studied hybrid bio-inspired evolutionary search algorithm and correlation-based feature selection method and evaluate their impact on extracted feature vectors from individual sensor modality. …”
Get full text
Get full text
Article -
12
Task offloading paradigm in mobile edge computing-current issues, adopted approaches, and future directions
Published 2023“…For each journal paper, the detailed information of the work area, targeted issue, formulation technique, optimization approach, adopted algorithms, evaluation techniques, performance matrices, dataset, utilized tools, and framework are extracted and analyzed using manual and automatic coding. …”
Get full text
Get full text
Article -
13
Framework for stream clustering of trajectories based on temporal micro clustering technique
Published 2018“…As a response towards the limitations of time window technique and the offline preprocessing methods, a framework for stream clustering of trajectories based on temporal micro clustering technique (SCT-TMC) is proposed. …”
Get full text
Get full text
Thesis -
14
The classification of wink-based eeg signals by means of transfer learning models
Published 2021“…It was demonstrated from the simulation investigation that the CWT model could yield a better signal transformation amongst the preprocessing algorithms. …”
Get full text
Get full text
Thesis -
15
Hybrid intelligent approach for network intrusion detection
Published 2015“…Due to the prevailing limitations of finding novel attacks, high false detection, and accuracy in previous intrusion detection approaches, this study has proposed a hybrid intelligent approach for network intrusion detection based on k-means clustering algorithm and support vector machine classification algorithm. …”
Get full text
Get full text
Get full text
Thesis -
16
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…We have developed a cloud-based application that adapts the enhanced authentication method, and its security measurement were evaluated using IBM Application Security on Cloud tool. …”
Get full text
Get full text
Get full text
Thesis -
17
Pose estimation algorithm for mobile Augmented Reality based on inertial sensor fusion
Published 2021“…After extensive experiments, the validity of the proposed method was superior to the existing vision-based pose estimation algorithms. …”
Get full text
Get full text
Get full text
Article -
18
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
Get full text
Get full text
Get full text
Academic Exercise -
19
Performance evaluation of Location-Sensitive Handoff using positioning method / Azuwa Ali and Saiful Fadzli Salian
Published 2009“…With the help of location information, handoff process can be optimize and increase the intelligent of radio resource management. …”
Get full text
Get full text
Research Reports -
20
REGION-BASED ADAPTIVE DISTRIBUTED VIDEO CODING CODEC
Published 2011“…This work also prbposes a feedback-free region-based adaptive DVC solution in pixel domain based on machine learning approach to estimate the side information. …”
Get full text
Get full text
Thesis
