Search Results - (( mobile evaluation new algorithm ) OR ( spider identification system algorithm ))*

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    A new multicast-based architecture to support host mobility in IPv6 by M. Ali, Borhanuddin, Habaebi, Mohamed Hadi, AI-Talib, Sahar

    Published 2003
    “…A new multicast group joidleave mechanism for mobile nodes (MNs) is proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  5. 5

    A new mobile malware classification for SMS exploitation by Zaizi N.J.M., Khailani A., Madihah Mohd Saudi

    Published 2024
    “…This research has developed a new mobile malware classification for Android smartphone using a covering algorithm. …”
    Conference Paper
  6. 6

    Improving performance of mobile ad hoc networks using efficient Tactical On Demand Distance Vector (TAODV) routing algorithm by Uddin, Mueen, Abdul Rahman, Azizah, Alarifi, Abdulrahman, Talha, Muhammad, Shah, Asadullah, Iftikhar, Mohsin, Zomaya, Albert

    Published 2012
    “…In this paper, we present the design and performance evaluation of a new efficient on demand routing protocol for mobile ad-hoc networks. …”
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Quality of service in mobile IP networks with parametric multi-channel routing algorithms based on linear programming approach by Gholizadeh, Somayyeh

    Published 2018
    “…To achieve mobility control in Mobile IP networks, a new linear programming formulation for guaranteeing the optimality of data transmission and network connectivity is proposed. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    A new multicast-based architecture to support host mobility in IPv6 by Mohd Ali, Borhanuddin, Habaebi, Mohamed Hadi, Al-Talib, Sahar Abdul Aziz

    Published 2003
    “…A new multicast group join/leave mechanism for mobile nodes (MNs) is proposed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm by Enshaei, Mehdi

    Published 2015
    “…In this study, a new defence mechanism is proposed based on modification of the packet forwarding process, using Neighborhood Information (NI) and PT algorithm, and known as NIPT algorithm. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15
  16. 16

    Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms by Hydara, Isatou

    Published 2024
    “…Comparisons of the evaluation results have shown improvements in the detection and removal of XSS vulnerabilities in desktop and mobile web applications. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks / Salmah Fattah by Salmah , Fattah

    Published 2022
    “…First, this research analyses the existing mobile underwater node deployment algorithms to identify the significant problems in existing solutions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks by Salmah Fattah

    Published 2022
    “…First, this research analyses the existing mobile underwater node deployment algorithms to identify the significant problems in existing solutions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Task offloading paradigm in mobile edge computing-current issues, adopted approaches, and future directions by Akhlaqi, Mohammad Yahya, Mohd Hanapi, Zurina

    Published 2023
    “…In addition, new technologies such as the Internet of Things (IoT), Autonomous Vehicles (AV), 5G, and Augmented Reality (AR) bring new demands and opportunities that MEC can make possible. …”
    Get full text
    Get full text
    Article
  20. 20

    Reduced Set Kernel Principal Component Analysis (Rskpca) Algorithm for Palm Print Based Mobile Biometric System by Ibrahim, Noor Salwani

    Published 2015
    “…In this research, algorithms involving palm print feature processing are evaluated so as to obtain optimum time and memory consumption. …”
    Get full text
    Get full text
    Thesis