Search Results - (( mobile evaluation method algorithm ) OR ( parameters communication a algorithm ))*

Refine Results
  1. 1

    Quality of service in mobile IP networks with parametric multi-channel routing algorithms based on linear programming approach by Gholizadeh, Somayyeh

    Published 2018
    “…This approach tunes the parameters of the linear programming models that are used in the other algorithms by using a dynamic element. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Improving performance of mobile ad hoc networks using efficient Tactical On Demand Distance Vector (TAODV) routing algorithm by Uddin, Mueen, Abdul Rahman, Azizah, Alarifi, Abdulrahman, Talha, Muhammad, Shah, Asadullah, Iftikhar, Mohsin, Zomaya, Albert

    Published 2012
    “…It also describes the design of a novel on-demand routing algorithm. Most of the proposed algorithms use a blind ooding technique during the route discovery process. …”
    Get full text
    Get full text
    Article
  3. 3
  4. 4
  5. 5

    Delay and energy-aware routing for efficient data collection in wireless sensor networks / Ihsan Ali by Ihsan , Ali

    Published 2024
    “…Both Bat Algorithm parameters and AFW parameters are adaptively tuned to balance exploration and exploitation throughout the optimization process. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Enhanced location and positioning in wimax networks with virtual mimo base station by Othman, Muhammad Hakim

    Published 2015
    “…Furthermore, a new hybrid algorithm enhancement of mobile station (MS) location estimation by using a single MIMO base station (SMBS) with the virtual base station has been introduced. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Artificial Bee Colony for Minimizing the Energy Consumption in Mobile Ad Hoc Network by Tareq, M., Abed, S.A., Sundararajan, E.A.

    Published 2019
    “…The aim of this paper is to find the best possible route from the source to the destination based on a method inspired by the searching behaviour of bee colonies, i.e. artificial bee colony (ABC) algorithm. …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Seamless vertical handover technique for vehicular ad-hoc networks using artificial bee colony-particle swarm optimisation by Abdulwahhab, Mohanad Mazin

    Published 2019
    “…These aspects are the information gathering of the network and the information usage during the vertical handover. Firstly, we proposed a multi-criteria artificial bee colony hybrid with particle swarm optimisation algorithm (MC ABC-PSO) for evaluating the information gathered from the mobile nodes in the handover. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Channel Modelling and Estimation in Multiple-Input Multiple-Output Orthogonal Frequency Division Multiplexing Wireless Communication Systems by Hezam, Mohammed Abdo Saeed

    Published 2008
    “…New time-domain (TD) adaptive estimation methods based on recursive least squares (RLS) and normalized least-mean squares (NLMS) algorithms are proposed. …”
    Get full text
    Get full text
    Thesis
  11. 11

    REGION-BASED ADAPTIVE DISTRIBUTED VIDEO CODING CODEC by ABDELRAHMAN ELAMIN, ABDELRAHMAN ELAMIN

    Published 2011
    “…The resulting regions map is compressed by employing quadtree algorithm and communicated to the encoder via the feedback channel. …”
    Get full text
    Get full text
    Thesis
  12. 12

    A Mobile Application For Stock Price Prediction by Choy, Yi Tou

    Published 2021
    “…The evaluation methods were Root Mean Square Error and Mean Absolute Error. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13

    Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim by Masmuhallim, Anis Athirah

    Published 2024
    “…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Permission-based fault tolerant mutual exclusion algorithm for mobile Ad Hoc networks by Zarafshan, Faraneh

    Published 2015
    “…This algorithm is presented and evaluated for different scenarios of mobility of nodes, failure, load and number of nodes. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A comprehensive overview of classical and modern route planning algorithms for self-driving mobile robots by Wan Daud, Wan Mohd Bukhari, Abu, Nur Syuhadah, Omar, Siti Nashayu, Sohaimeh, Shahirul Ashraf, Adli,, M. H.

    Published 2022
    “…Classical or traditional methods, such as Roadmaps (Visibility Graph and Voronoi Diagram), Potential Fields, and Cell Decomposition, and modern methodologies such as heuristic-based (Dijkstra Method, A* Algorithms, and D* Algorithms), metaheuristics algorithms (such as PSO, Bat Algorithm, ACO, and Genetic Algorithm), and neural systems such as fuzzy neural networks or fuzzy logic (FL) and Artificial Neural Networks (ANN) are described in this report. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Design and evaluation on adaptive fuzzy speed control of mobile robot by Abdollahi, Mohammadreza

    Published 2011
    “…Given a reference trajectory, the performances of these methods are compared with fuzzy PI controller (FPIC), through experimental evaluations. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Extracting crown morphology with a low-cost mobile LiDAR scanning system in the natural environment by Wang, Kai, Zhou, Jun, Zhang, Wenhai, Zhang, Baohua

    Published 2021
    “…The algorithm defined in this study was evaluated with manual measurements as reference, and the morphological parameters of the canopy obtained using the LOAM and LeGO-LOAM algorithms as the basic framework were compared. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm by Enshaei, Mehdi

    Published 2015
    “…This algorithm is good for MANET as they not have centralized management and autonomous mobile nodes connect with each other through the air. …”
    Get full text
    Get full text
    Thesis