Search Results - (( mobile evaluation method algorithm ) OR ( mobile information based algorithm ))
Search alternatives:
- mobile information »
- mobile evaluation »
- information based »
- method algorithm »
-
1
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…In this study, a new defence mechanism is proposed based on modification of the packet forwarding process, using Neighborhood Information (NI) and PT algorithm, and known as NIPT algorithm. …”
Get full text
Get full text
Thesis -
2
A comprehensive overview of classical and modern route planning algorithms for self-driving mobile robots
Published 2022“…Classical or traditional methods, such as Roadmaps (Visibility Graph and Voronoi Diagram), Potential Fields, and Cell Decomposition, and modern methodologies such as heuristic-based (Dijkstra Method, A* Algorithms, and D* Algorithms), metaheuristics algorithms (such as PSO, Bat Algorithm, ACO, and Genetic Algorithm), and neural systems such as fuzzy neural networks or fuzzy logic (FL) and Artificial Neural Networks (ANN) are described in this report. …”
Get full text
Get full text
Get full text
Article -
3
Neighbour-based on-demand routing algorithms for mobile ad hoc networks
Published 2017“…Accordingly, a Novel Density-Aware Routing algorithm (NDAR) is proposed. The proposed algorithm totally eliminates the need for fixed threshold values through the use of a novel formula that can easily estimate the node density and replace the fixed threshold value based on the neighbor information. …”
Get full text
Get full text
Get full text
Thesis -
4
Pose estimation algorithm for mobile Augmented Reality based on inertial sensor fusion
Published 2021“…After extensive experiments, the validity of the proposed method was superior to the existing vision-based pose estimation algorithms. …”
Get full text
Get full text
Get full text
Article -
5
Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli
Published 2021“…The manual method often has a lack of knowledge that the menu that shows the customer does not provide any information that customers need, such as an image of the food or ingredients used in the menu. …”
Get full text
Get full text
Thesis -
6
Mobility-aware Offloading Decision For Multi-access Edge Computing In 5g Networks
Published 2024journal::journal article -
7
Seamless vertical handover technique for vehicular ad-hoc networks using artificial bee colony-particle swarm optimisation
Published 2019“…Firstly, we proposed a multi-criteria artificial bee colony hybrid with particle swarm optimisation algorithm (MC ABC-PSO) for evaluating the information gathered from the mobile nodes in the handover. …”
Get full text
Get full text
Thesis -
8
Performance evaluation of Location-Sensitive Handoff using positioning method / Azuwa Ali and Saiful Fadzli Salian
Published 2009“…Handoff performance is analyze based on the number of handoff occurred with respect to user mobility, fading and propagation effect. …”
Get full text
Get full text
Research Reports -
9
Reduced Set Kernel Principal Component Analysis (Rskpca) Algorithm for Palm Print Based Mobile Biometric System
Published 2015“…In this study mobile biometric system based on palm print modality is developed. …”
Get full text
Get full text
Thesis -
10
An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias
Published 2017“…Therefore, this project has proposed a method called token based alert notification. There are three algorithm developed for token based alert notification which is tokenization algorithm, token matching algorithm and item identification algorithm. …”
Get full text
Get full text
Thesis -
11
Home buyer assistant using artificial bee colony algorithm / Muhammad Izzat Azri Azman
Published 2017“…The assistant will provide suitable house recommendation to a home buyer based on particular information house specification such as house price, locations neighbourhood and surrounding information. …”
Get full text
Get full text
Thesis -
12
Task offloading paradigm in mobile edge computing-current issues, adopted approaches, and future directions
Published 2023“…For each journal paper, the detailed information of the work area, targeted issue, formulation technique, optimization approach, adopted algorithms, evaluation techniques, performance matrices, dataset, utilized tools, and framework are extracted and analyzed using manual and automatic coding. …”
Get full text
Get full text
Article -
13
The classification of wink-based eeg signals by means of transfer learning models
Published 2021“…It was demonstrated from the simulation investigation that the CWT model could yield a better signal transformation amongst the preprocessing algorithms. In addition, amongst the eighteen TL models evaluated based on the CWT transformation, fourteen was f ound to be able to extract the features reasonable, i.e., VGG16, VGG19, ResNet101, ResNet101 V2, ResNet152, ResNet152 V2, Inception V3, Inception ResNet V2, Xception, MobileNetV2, DenseNet 121, DenseNet 169, NasNetMobile and NasNetLarge. …”
Get full text
Get full text
Thesis -
14
Efficient management of Top-k queries over Uncertain Data Streams with dynamic Sliding Window Model
Published 2024“…Today, the advancement of information technology has led to a growing need for continuous processing of significant events, such as enhanced methods for monitoring road speed and mobile computing. …”
Get full text
Get full text
Get full text
Thesis -
15
Multi-sensor fusion based on multiple classifier systems for human activity identification
Published 2019“…To provide compact feature vector representation, we studied hybrid bio-inspired evolutionary search algorithm and correlation-based feature selection method and evaluate their impact on extracted feature vectors from individual sensor modality. …”
Get full text
Get full text
Article -
16
Design of a Fuzzy Logic Controller for Skid Steer Mobile Robot
Published 2009“…Data acquisition is done in a LABVIEW and a MATLAB control algorithm is called in LABVIEW. A real mobile robot, PUTRABOT2 was used to conduct the experiment. …”
Get full text
Get full text
Thesis -
17
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…The proposed authentication method, uses an enhanced method where the credentials are encrypted through an algorithm. …”
Get full text
Get full text
Get full text
Thesis -
18
Hybrid intelligent approach for network intrusion detection
Published 2015“…A lot of sensitive information passes through various kinds of computer devices, ranging from minicomputers to servers and mobile devices. …”
Get full text
Get full text
Get full text
Thesis -
19
Framework for stream clustering of trajectories based on temporal micro clustering technique
Published 2018“…A comprehensive experimental analysis was conducted to evaluate the efficiency and effectiveness of the proposed algorithms (ONF-TRS, CC-TRS). …”
Get full text
Get full text
Thesis -
20
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The project's expected outcome is a GPS-Based Physical Identity and Access Management System with the selected lightweight geo-encryption algorithm that can be used to support the control access and management operations of UMS security division.…”
Get full text
Get full text
Get full text
Academic Exercise
