Search Results - (( mobile evaluation new algorithm ) OR ( early identification method algorithm ))

Refine Results
  1. 1
  2. 2

    Methods for identification of the opportunistic gut mycobiome from colorectal adenocarcinoma biopsy tissues by Aisyah, Yunus, Norfilza, Mohd Mokhtar, Raja Affendi, Raja Ali *, Siti Maryam, Ahmad Kendong, Hajar, Fauzan Ahmad

    Published 2024
    “…•Application of machine learning algorithms to the identification of potential mycobiome biomarkers for non-invasive colorectal cancer screening. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4
  5. 5

    A new multicast-based architecture to support host mobility in IPv6 by M. Ali, Borhanuddin, Habaebi, Mohamed Hadi, AI-Talib, Sahar

    Published 2003
    “…A new multicast group joidleave mechanism for mobile nodes (MNs) is proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6

    A new mobile malware classification for SMS exploitation by Zaizi N.J.M., Khailani A., Madihah Mohd Saudi

    Published 2024
    “…This research has developed a new mobile malware classification for Android smartphone using a covering algorithm. …”
    Conference Paper
  7. 7

    Improving performance of mobile ad hoc networks using efficient Tactical On Demand Distance Vector (TAODV) routing algorithm by Uddin, Mueen, Abdul Rahman, Azizah, Alarifi, Abdulrahman, Talha, Muhammad, Shah, Asadullah, Iftikhar, Mohsin, Zomaya, Albert

    Published 2012
    “…In this paper, we present the design and performance evaluation of a new efficient on demand routing protocol for mobile ad-hoc networks. …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Quality of service in mobile IP networks with parametric multi-channel routing algorithms based on linear programming approach by Gholizadeh, Somayyeh

    Published 2018
    “…To achieve mobility control in Mobile IP networks, a new linear programming formulation for guaranteeing the optimality of data transmission and network connectivity is proposed. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    A new multicast-based architecture to support host mobility in IPv6 by Mohd Ali, Borhanuddin, Habaebi, Mohamed Hadi, Al-Talib, Sahar Abdul Aziz

    Published 2003
    “…A new multicast group join/leave mechanism for mobile nodes (MNs) is proposed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm by Enshaei, Mehdi

    Published 2015
    “…In this study, a new defence mechanism is proposed based on modification of the packet forwarding process, using Neighborhood Information (NI) and PT algorithm, and known as NIPT algorithm. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18

    Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms by Hydara, Isatou

    Published 2024
    “…Comparisons of the evaluation results have shown improvements in the detection and removal of XSS vulnerabilities in desktop and mobile web applications. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Identification of transformer fault based on dissolved gas analysis using hybrid support vector machine-modified evolutionary particle swarm optimisation by Illias, Hazlee Azil, Wee, Zhao Liang

    Published 2018
    “…It was found that the proposed hybrid SVM-Modified EPSO (MEPSO)-Time Varying Acceleration Coefficient (TVAC) technique results in the highest correct identification percentage of faults in a power transformer compared to other PSO algorithms. …”
    Get full text
    Get full text
    Article
  20. 20

    A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks / Salmah Fattah by Salmah , Fattah

    Published 2022
    “…First, this research analyses the existing mobile underwater node deployment algorithms to identify the significant problems in existing solutions. …”
    Get full text
    Get full text
    Get full text
    Thesis