Search Results - (( mobile evaluation method algorithm ) OR ( based information sharing algorithm ))*
Search alternatives:
- information sharing »
- mobile evaluation »
- based information »
- sharing algorithm »
- method algorithm »
-
1
Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli
Published 2021“…In modern society, with the advent of technology, people can easily share information, interact with each other and do their job on an online platform. …”
Get full text
Get full text
Thesis -
2
Seamless vertical handover technique for vehicular ad-hoc networks using artificial bee colony-particle swarm optimisation
Published 2019“…The final operation involves the mobile node sharing the current information with its neighbours’ nodes based on its current location. …”
Get full text
Get full text
Thesis -
3
Lightweight ECC Based Multifactor Authentication Protocol (LEMAP) for Device to Device Cellular Network
Published 2022“…The results show that LEMAP is 6%-28% percent stronger than the selected benchmark algorithms such as 2PAKEP, Chaotic based authentication and TwoFactor authentication protocol. …”
Get full text
Get full text
Thesis -
4
A Mobile Application For Stock Price Prediction
Published 2021“…The evaluation methods were Root Mean Square Error and Mean Absolute Error. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim
Published 2024“…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
Get full text
Get full text
Thesis -
6
Cognitive map approach for mobility path optimization using multiple objectives genetic algorithm
Published 2023Subjects:Conference Paper -
7
Permission-based fault tolerant mutual exclusion algorithm for mobile Ad Hoc networks
Published 2015“…This algorithm is presented and evaluated for different scenarios of mobility of nodes, failure, load and number of nodes. …”
Get full text
Get full text
Thesis -
8
Improving performance of mobile ad hoc networks using efficient Tactical On Demand Distance Vector (TAODV) routing algorithm
Published 2012“…This paper presents that the proposed on demand routing algorithm performs better in mobile ad-hoc environment than other traditional algorithms. …”
Get full text
Get full text
Article -
9
Quality of service in mobile IP networks with parametric multi-channel routing algorithms based on linear programming approach
Published 2018“…Furthermore, Optimized Parametric Topology Control Routing algorithm performs significantly better than Triangular Routing Method and Change Foreign Agent Algorithm. …”
Get full text
Get full text
Thesis -
10
A comprehensive overview of classical and modern route planning algorithms for self-driving mobile robots
Published 2022“…Classical or traditional methods, such as Roadmaps (Visibility Graph and Voronoi Diagram), Potential Fields, and Cell Decomposition, and modern methodologies such as heuristic-based (Dijkstra Method, A* Algorithms, and D* Algorithms), metaheuristics algorithms (such as PSO, Bat Algorithm, ACO, and Genetic Algorithm), and neural systems such as fuzzy neural networks or fuzzy logic (FL) and Artificial Neural Networks (ANN) are described in this report. …”
Get full text
Get full text
Get full text
Article -
11
-
12
Design and evaluation on adaptive fuzzy speed control of mobile robot
Published 2011“…Given a reference trajectory, the performances of these methods are compared with fuzzy PI controller (FPIC), through experimental evaluations. …”
Get full text
Get full text
Thesis -
13
Extracting crown morphology with a low-cost mobile LiDAR scanning system in the natural environment
Published 2021“…The algorithm defined in this study was evaluated with manual measurements as reference, and the morphological parameters of the canopy obtained using the LOAM and LeGO-LOAM algorithms as the basic framework were compared. …”
Get full text
Get full text
Get full text
Article -
14
Security Framework Based on Reputation Mechanism for Peer-To-Peer Systems
Published 2004“…The “reputation sharing” based on a distributed polling iv algorithm in which the resource requestors can assess the reliability of respective provider before initiating the download. …”
Get full text
Get full text
Thesis -
15
A priority based job scheduling algorithm in cloud computing
Published 2012“…The proposed algorithm is based on multiple criteria decision making model.…”
Get full text
Get full text
Conference or Workshop Item -
16
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…This algorithm is good for MANET as they not have centralized management and autonomous mobile nodes connect with each other through the air. …”
Get full text
Get full text
Thesis -
17
-
18
Pose estimation algorithm for mobile Augmented Reality based on inertial sensor fusion
Published 2021“…After extensive experiments, the validity of the proposed method was superior to the existing vision-based pose estimation algorithms. …”
Get full text
Get full text
Get full text
Article -
19
-
20
Relationship based replication algorithm for data grid
Published 2014“…Such an approach overcomes existing algorithms that is based either on users request or resource capabilities as an individual. …”
Get full text
Get full text
Monograph
