Search Results - (( mobile evaluation new algorithm ) OR ( user identification using algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Effective predicate identification algorithm for XML retrieval by Roko, Abubakar, C. Doraisamy, Shyamala, Nakone, Bello

    Published 2018
    “…Finally, an effective predicate identification algorithm (EPIA) which uses EBQS and STPS to return relevant predicates is introduced. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5

    A new multicast-based architecture to support host mobility in IPv6 by M. Ali, Borhanuddin, Habaebi, Mohamed Hadi, AI-Talib, Sahar

    Published 2003
    “…A new multicast group joidleave mechanism for mobile nodes (MNs) is proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6

    Effective query structuring with ranking using named entity categories for XML retrieval by Roko, Abubakar

    Published 2016
    “…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    A new mobile malware classification for SMS exploitation by Zaizi N.J.M., Khailani A., Madihah Mohd Saudi

    Published 2024
    “…This research has developed a new mobile malware classification for Android smartphone using a covering algorithm. …”
    Conference Paper
  8. 8
  9. 9

    Eeg-Based Person Identification Using Multi-Levelwavelet Decomposition With Multi-Objective Flower Pollination Algorithm by Yahya Alyasseri, Zaid Abdi Alkareem

    Published 2020
    “…For addressing these points, a novel person identification method that is using EEG with multi-level wavelet decomposition and multi-objective flower pollination algorithm is proposed in this thesis. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Improving performance of mobile ad hoc networks using efficient Tactical On Demand Distance Vector (TAODV) routing algorithm by Uddin, Mueen, Abdul Rahman, Azizah, Alarifi, Abdulrahman, Talha, Muhammad, Shah, Asadullah, Iftikhar, Mohsin, Zomaya, Albert

    Published 2012
    “…In this paper, we present the design and performance evaluation of a new efficient on demand routing protocol for mobile ad-hoc networks. …”
    Get full text
    Get full text
    Article
  11. 11

    Effects of user selected conditions on modeling of dynamic systems using adaptive fuzzy model by Yaacob, Mohd. Shafiek, Jamaluddin, Hishamuddin

    Published 2001
    “…The implementation and the computational aspects of the training algorithm are also highlighted. Three examples of discrete-time nonlinear systems are used in the simulation study to show the effects of user selected conditions on the identification process. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13
  14. 14

    Quality of service in mobile IP networks with parametric multi-channel routing algorithms based on linear programming approach by Gholizadeh, Somayyeh

    Published 2018
    “…To achieve mobility control in Mobile IP networks, a new linear programming formulation for guaranteeing the optimality of data transmission and network connectivity is proposed. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17

    A new multicast-based architecture to support host mobility in IPv6 by Mohd Ali, Borhanuddin, Habaebi, Mohamed Hadi, Al-Talib, Sahar Abdul Aziz

    Published 2003
    “…A new multicast group join/leave mechanism for mobile nodes (MNs) is proposed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm by Enshaei, Mehdi

    Published 2015
    “…In this study, a new defence mechanism is proposed based on modification of the packet forwarding process, using Neighborhood Information (NI) and PT algorithm, and known as NIPT algorithm. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Smart cards and the fingerprint: a framework for user identification and authentication by Omar, M. H., Din, Roshidi, Tahir, H. M.

    Published 2003
    “…As a result, the research proposed a framework for user identification and authentication in automatic-teller-machine (ATM) systems using fingerprints and smart cards as opposed to the PIN and magnetic-stripe cards.…”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Tag clouds algorithm with the inclusion of personality traits by Ahmad Affandi, Supli

    Published 2015
    “…This algorithm is beneficial for decision making using information visualization in which personality traits of the user are heavily inclined. …”
    Get full text
    Get full text
    Get full text
    Thesis