Search Results - (( mobile evaluation method algorithm ) OR ( mobile information based algorithm ))

Refine Results
  1. 1

    Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm by Enshaei, Mehdi

    Published 2015
    “…In this study, a new defence mechanism is proposed based on modification of the packet forwarding process, using Neighborhood Information (NI) and PT algorithm, and known as NIPT algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    A comprehensive overview of classical and modern route planning algorithms for self-driving mobile robots by Wan Daud, Wan Mohd Bukhari, Abu, Nur Syuhadah, Omar, Siti Nashayu, Sohaimeh, Shahirul Ashraf, Adli,, M. H.

    Published 2022
    “…Classical or traditional methods, such as Roadmaps (Visibility Graph and Voronoi Diagram), Potential Fields, and Cell Decomposition, and modern methodologies such as heuristic-based (Dijkstra Method, A* Algorithms, and D* Algorithms), metaheuristics algorithms (such as PSO, Bat Algorithm, ACO, and Genetic Algorithm), and neural systems such as fuzzy neural networks or fuzzy logic (FL) and Artificial Neural Networks (ANN) are described in this report. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Neighbour-based on-demand routing algorithms for mobile ad hoc networks by Ejmaa, Ali Mohamed E.

    Published 2017
    “…Accordingly, a Novel Density-Aware Routing algorithm (NDAR) is proposed. The proposed algorithm totally eliminates the need for fixed threshold values through the use of a novel formula that can easily estimate the node density and replace the fixed threshold value based on the neighbor information. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Pose estimation algorithm for mobile Augmented Reality based on inertial sensor fusion by Alam, Mir Suhail, Morshidi, Malik Arman, Gunawan, Teddy Surya, Olanrewaju, Rashidah Funke, Arifin, Fatchul

    Published 2021
    “…After extensive experiments, the validity of the proposed method was superior to the existing vision-based pose estimation algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli by Dzulkifli, Muhammad Zulhilmie

    Published 2021
    “…The manual method often has a lack of knowledge that the menu that shows the customer does not provide any information that customers need, such as an image of the food or ingredients used in the menu. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Seamless vertical handover technique for vehicular ad-hoc networks using artificial bee colony-particle swarm optimisation by Abdulwahhab, Mohanad Mazin

    Published 2019
    “…Firstly, we proposed a multi-criteria artificial bee colony hybrid with particle swarm optimisation algorithm (MC ABC-PSO) for evaluating the information gathered from the mobile nodes in the handover. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Performance evaluation of Location-Sensitive Handoff using positioning method / Azuwa Ali and Saiful Fadzli Salian by Ali, Azuwa, Salian, Saiful Fadzli

    Published 2009
    “…Handoff performance is analyze based on the number of handoff occurred with respect to user mobility, fading and propagation effect. …”
    Get full text
    Get full text
    Research Reports
  9. 9

    Reduced Set Kernel Principal Component Analysis (Rskpca) Algorithm for Palm Print Based Mobile Biometric System by Ibrahim, Noor Salwani

    Published 2015
    “…In this study mobile biometric system based on palm print modality is developed. …”
    Get full text
    Get full text
    Thesis
  10. 10

    An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias by Alias, Nur Farehah

    Published 2017
    “…Therefore, this project has proposed a method called token based alert notification. There are three algorithm developed for token based alert notification which is tokenization algorithm, token matching algorithm and item identification algorithm. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Home buyer assistant using artificial bee colony algorithm / Muhammad Izzat Azri Azman by Azman, Muhammad Izzat Azri

    Published 2017
    “…The assistant will provide suitable house recommendation to a home buyer based on particular information house specification such as house price, locations neighbourhood and surrounding information. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Task offloading paradigm in mobile edge computing-current issues, adopted approaches, and future directions by Akhlaqi, Mohammad Yahya, Mohd Hanapi, Zurina

    Published 2023
    “…For each journal paper, the detailed information of the work area, targeted issue, formulation technique, optimization approach, adopted algorithms, evaluation techniques, performance matrices, dataset, utilized tools, and framework are extracted and analyzed using manual and automatic coding. …”
    Get full text
    Get full text
    Article
  13. 13

    The classification of wink-based eeg signals by means of transfer learning models by Jothi Letchumy, Mahendra Kumar

    Published 2021
    “…It was demonstrated from the simulation investigation that the CWT model could yield a better signal transformation amongst the preprocessing algorithms. In addition, amongst the eighteen TL models evaluated based on the CWT transformation, fourteen was f ound to be able to extract the features reasonable, i.e., VGG16, VGG19, ResNet101, ResNet101 V2, ResNet152, ResNet152 V2, Inception V3, Inception ResNet V2, Xception, MobileNetV2, DenseNet 121, DenseNet 169, NasNetMobile and NasNetLarge. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Efficient management of Top-k queries over Uncertain Data Streams with dynamic Sliding Window Model by Raja Wahab, Raja Azhan Syah

    Published 2024
    “…Today, the advancement of information technology has led to a growing need for continuous processing of significant events, such as enhanced methods for monitoring road speed and mobile computing. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Multi-sensor fusion based on multiple classifier systems for human activity identification by Nweke, Henry Friday, Teh, Ying Wah, Mujtaba, Ghulam, Alo, Uzoma Rita, Al-garadi, Mohammed Ali

    Published 2019
    “…To provide compact feature vector representation, we studied hybrid bio-inspired evolutionary search algorithm and correlation-based feature selection method and evaluate their impact on extracted feature vectors from individual sensor modality. …”
    Get full text
    Get full text
    Article
  16. 16

    Design of a Fuzzy Logic Controller for Skid Steer Mobile Robot by Abdul Rahman, Mohd Azizi

    Published 2009
    “…Data acquisition is done in a LABVIEW and a MATLAB control algorithm is called in LABVIEW. A real mobile robot, PUTRABOT2 was used to conduct the experiment. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Enhancing user authentication for cloud web-based application / Detar Beqo by Detar , Beqo

    Published 2018
    “…The proposed authentication method, uses an enhanced method where the credentials are encrypted through an algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Hybrid intelligent approach for network intrusion detection by Al-Mohammed, Wael Hasan Ali

    Published 2015
    “…A lot of sensitive information passes through various kinds of computer devices, ranging from minicomputers to servers and mobile devices. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Framework for stream clustering of trajectories based on temporal micro clustering technique by Abdulrazzaq, Musaab Riyadh

    Published 2018
    “…A comprehensive experimental analysis was conducted to evaluate the efficiency and effectiveness of the proposed algorithms (ONF-TRS, CC-TRS). …”
    Get full text
    Get full text
    Thesis
  20. 20

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The project's expected outcome is a GPS-Based Physical Identity and Access Management System with the selected lightweight geo-encryption algorithm that can be used to support the control access and management operations of UMS security division.…”
    Get full text
    Get full text
    Get full text
    Academic Exercise