Search Results - (( mobile evaluation new algorithm ) OR ( whale optimization means algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Enhancement of Groundwater-Level Prediction Using an Integrated Machine Learning Model Optimized by Whale Algorithm by Banadkooki F.B., Ehteram M., Ahmed A.N., Teo F.Y., Fai C.M., Afan H.A., Sapitang M., El-Shafie A.

    Published 2023
    “…For the test stage, the mean absolute error of the MLP�WA model decreased to 30% and from 31 to 38% as compared to the radial basis function�whale algorithm (RBF�WA) and GP models, respectively. …”
    Article
  4. 4

    Application and evaluation of the evolutionary algorithms combined with conventional neural network to determine the building energy consumption of the residential sector by Wang G., Mukhtar A., Moayedi H., Khalilpoor N., Tt Q.

    Published 2025
    “…The primary objectives were to assess the performance of three evolutionary algorithms ? Heap-Based Optimizer (HBO), Multiverse Optimizer (MVO), and Whale Optimization Algorithm (WOA) ? …”
    Article
  5. 5

    Hybrid flow shop scheduling with energy consumption in machine shop using moth flame optimization by M. F. F., Ab Rashid, Ahmad Nasser, Mohd Rose, N. M. Zuki, N. M.

    Published 2022
    “…The results were also compared with relatively recent algorithm such as Whale Optimization Algorithm and Harris Haws Optimization. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Multi-criteria optimization framework for cloudlet computing in WMANs: integrating VL-WIDE and AHP for enhanced decision-making by Muwafaq, Layth, Noordin, Nor K, Othman, Mohamed, Ismail, Alyani, Hashim, Fazirulhisyam

    Published 2026
    “…Our method employs a variable-length multi-objective whale optimization integrated with differential evolution (VL-WIDE) to tackle the optimization problem, dynamically adjusting to the WMAN environment while optimizing delay, energy consumption (both user device and cloudlet), and cloudlet deployment cost. …”
    Get full text
    Get full text
    Article
  7. 7
  8. 8
  9. 9
  10. 10

    A new multicast-based architecture to support host mobility in IPv6 by M. Ali, Borhanuddin, Habaebi, Mohamed Hadi, AI-Talib, Sahar

    Published 2003
    “…A new multicast group joidleave mechanism for mobile nodes (MNs) is proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    A new mobile malware classification for SMS exploitation by Zaizi N.J.M., Khailani A., Madihah Mohd Saudi

    Published 2024
    “…This research has developed a new mobile malware classification for Android smartphone using a covering algorithm. …”
    Conference Paper
  12. 12

    Improving performance of mobile ad hoc networks using efficient Tactical On Demand Distance Vector (TAODV) routing algorithm by Uddin, Mueen, Abdul Rahman, Azizah, Alarifi, Abdulrahman, Talha, Muhammad, Shah, Asadullah, Iftikhar, Mohsin, Zomaya, Albert

    Published 2012
    “…In this paper, we present the design and performance evaluation of a new efficient on demand routing protocol for mobile ad-hoc networks. …”
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Quality of service in mobile IP networks with parametric multi-channel routing algorithms based on linear programming approach by Gholizadeh, Somayyeh

    Published 2018
    “…To achieve mobility control in Mobile IP networks, a new linear programming formulation for guaranteeing the optimality of data transmission and network connectivity is proposed. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17

    A new multicast-based architecture to support host mobility in IPv6 by Mohd Ali, Borhanuddin, Habaebi, Mohamed Hadi, Al-Talib, Sahar Abdul Aziz

    Published 2003
    “…A new multicast group join/leave mechanism for mobile nodes (MNs) is proposed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm by Enshaei, Mehdi

    Published 2015
    “…In this study, a new defence mechanism is proposed based on modification of the packet forwarding process, using Neighborhood Information (NI) and PT algorithm, and known as NIPT algorithm. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20