Search Results - (( mobile evaluation study algorithm ) OR ( spider communication system algorithm ))

Refine Results
  1. 1

    A comparative study on ant-colony algorithm and genetic algorithm for mobile robot planning. by Rajendran, Piraviendran, Othman, Muhaini

    Published 2024
    “…Focusing on routing optimization, the study evaluates Ant-Colony Optimization (ACO) and Genetic Algorithm (GA) in Mobile Robot Planning. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2
  3. 3

    Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim by Masmuhallim, Anis Athirah

    Published 2024
    “…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    A coalition model for efficient indexing in wireless sensor network with random mobility / Hazem Jihad Ali Badarneh by Hazem Jihad , Ali Badarneh

    Published 2021
    “…The second evaluation divides into three scenarios. The first one evaluates Coalition-Based Index-Tree framework independently, without any effect from Dynamic-Coalition framework and Static-Coalition algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Machine learning model for performance prediction in mobile network management / Muhammad Hazim Wahid by Wahid, Muhammad Hazim

    Published 2022
    “…This study aims to propose the best machine learning algorithm for predicting mobile network performance. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Systematic Analysis on Mobile Botnet Detection Techniques Using Genetic Algorithm by Rahman, MZA, Madihah Mohd Saudi

    Published 2024
    “…A case study was carried out to reverse engineering the mobile botnet codes. …”
    Proceedings Paper
  8. 8
  9. 9

    A comparison study of classifier algorithms for mobile-phone’s accelerometer based activity recognition by Ayu, Media Anugerah, Ismail, Siti Aisyah, Abdul Matin, Ahmad Faridi, Mantoro, Teddy

    Published 2012
    “…As a continuation of the research towards the search for a suitable and reliable algorithm for real-time activity recognition using mobile phone, an evaluation and comparison study of the performance of seven different categories of classifier algorithms in classifying user activities were conducted. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Improving performance of mobile ad hoc networks using efficient Tactical On Demand Distance Vector (TAODV) routing algorithm by Uddin, Mueen, Abdul Rahman, Azizah, Alarifi, Abdulrahman, Talha, Muhammad, Shah, Asadullah, Iftikhar, Mohsin, Zomaya, Albert

    Published 2012
    “…This paper presents that the proposed on demand routing algorithm performs better in mobile ad-hoc environment than other traditional algorithms. …”
    Get full text
    Get full text
    Article
  11. 11

    Permission-based fault tolerant mutual exclusion algorithm for mobile Ad Hoc networks by Zarafshan, Faraneh

    Published 2015
    “…This study focuses on resolving the problem of mutual exclusion in mobile ad hoc networks. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Age And Gender Recognition Mobile App by Wee, Quo Lung

    Published 2023
    “…Through reviewing and evaluate the existing age and gender recognition mobile apps and their deep learning algorithm, the study found the number of existing age and gender recognition mobile app is very less. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  13. 13

    WCDMA forward link capacity improvement by using adaptive antenna with genetic algorithm assisted MDPC beamforming technique by Kiong T.S., Ismail M., Hassan A.

    Published 2023
    “…A dynamic radio network simulator was developed in Visual C++� to study the power consumption at Node B and estimate the downlink capacity improvement by implementing this novel algorithm. …”
    Article
  14. 14
  15. 15
  16. 16

    Inter system handoff management in cellular mobile networks / Syamil Khalid by Khalid, Syamil

    “…The theoretical analysis and simulation result are studied to evaluate the handoffs parameters.…”
    Get full text
    Get full text
    Article
  17. 17

    Inter-system handoff management in mobile cellular networks / Syamil Khalid by Khalid, Syamil

    Published 2011
    “…The theoretical analysis and simulation result are studied to evaluate the handoff parameters and signal strength of mobility.…”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    User interface and interactivity design guidelines of algorithm visualization on mobile platform by Supli, Ahmad Affandi

    Published 2019
    “…Students can watch and observe through the elaboration of dynamic animation. Previous studies show that AV mobile study is still limited. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm by Enshaei, Mehdi

    Published 2015
    “…Experimental evaluation shows that NIPT algorithm achieves better results in the PDR and delay with an average of 5% and 6% respectively, over the PT algorithm. …”
    Get full text
    Get full text
    Thesis