Search Results - (( mobile evaluation new algorithm ) OR ( user identification using algorithm ))
Search alternatives:
- identification using »
- user identification »
- mobile evaluation »
- using algorithm »
- evaluation new »
- new algorithm »
-
1
A new Doppler Spread Estimation Algorithm Based on Zero Crossings of The Auto-correlation
Published 2010Get full text
Get full text
Get full text
Conference or Workshop Item -
2
-
3
Effective predicate identification algorithm for XML retrieval
Published 2018“…Finally, an effective predicate identification algorithm (EPIA) which uses EBQS and STPS to return relevant predicates is introduced. …”
Get full text
Get full text
Conference or Workshop Item -
4
-
5
A new multicast-based architecture to support host mobility in IPv6
Published 2003“…A new multicast group joidleave mechanism for mobile nodes (MNs) is proposed. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
Get full text
Get full text
Get full text
Thesis -
7
A new mobile malware classification for SMS exploitation
Published 2024“…This research has developed a new mobile malware classification for Android smartphone using a covering algorithm. …”
Conference Paper -
8
-
9
Eeg-Based Person Identification Using Multi-Levelwavelet Decomposition With Multi-Objective Flower Pollination Algorithm
Published 2020“…For addressing these points, a novel person identification method that is using EEG with multi-level wavelet decomposition and multi-objective flower pollination algorithm is proposed in this thesis. …”
Get full text
Get full text
Thesis -
10
Improving performance of mobile ad hoc networks using efficient Tactical On Demand Distance Vector (TAODV) routing algorithm
Published 2012“…In this paper, we present the design and performance evaluation of a new efficient on demand routing protocol for mobile ad-hoc networks. …”
Get full text
Get full text
Article -
11
Effects of user selected conditions on modeling of dynamic systems using adaptive fuzzy model
Published 2001“…The implementation and the computational aspects of the training algorithm are also highlighted. Three examples of discrete-time nonlinear systems are used in the simulation study to show the effects of user selected conditions on the identification process. …”
Get full text
Get full text
Get full text
Article -
12
An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias
Published 2017“…Android smartphone is used in order to test this algorithm.…”
Get full text
Get full text
Thesis -
13
-
14
Quality of service in mobile IP networks with parametric multi-channel routing algorithms based on linear programming approach
Published 2018“…To achieve mobility control in Mobile IP networks, a new linear programming formulation for guaranteeing the optimality of data transmission and network connectivity is proposed. …”
Get full text
Get full text
Thesis -
15
-
16
A new mobile malware classification for call log exploitation
Published 2024journal::journal article -
17
A new multicast-based architecture to support host mobility in IPv6
Published 2003“…A new multicast group join/leave mechanism for mobile nodes (MNs) is proposed. …”
Get full text
Get full text
Conference or Workshop Item -
18
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…In this study, a new defence mechanism is proposed based on modification of the packet forwarding process, using Neighborhood Information (NI) and PT algorithm, and known as NIPT algorithm. …”
Get full text
Get full text
Thesis -
19
Smart cards and the fingerprint: a framework for user identification and authentication
Published 2003“…As a result, the research proposed a framework for user identification and authentication in automatic-teller-machine (ATM) systems using fingerprints and smart cards as opposed to the PIN and magnetic-stripe cards.…”
Get full text
Get full text
Get full text
Article -
20
Tag clouds algorithm with the inclusion of personality traits
Published 2015“…This algorithm is beneficial for decision making using information visualization in which personality traits of the user are heavily inclined. …”
Get full text
Get full text
Get full text
Thesis
