Search Results - (( mobile validation study algorithm ) OR ( panel identification _ algorithm ))*
Search alternatives:
-
1
Dynamic path planning algorithm in mobile robot navigation
Published 2011“…This study is focused on exploring the algorithm that avoids acute obstacles in the environment. …”
Get full text
Get full text
Conference or Workshop Item -
2
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Therefore for this study we try to create a new lightweight algorithm for mobile device, we want to implement identity based encryption with new feature, suitable for mobile device specification. …”
Get full text
Get full text
Conference or Workshop Item -
3
Model predictive control for MPPT of distributed photovoltaic module
Published 2017“…Unfortunately, a P&O algorithm does not harvesting a true MPP of the PV panel during the operation. …”
Get full text
Get full text
Student Project -
4
User interface and interactivity design guidelines of algorithm visualization on mobile platform
Published 2019“…Students can watch and observe through the elaboration of dynamic animation. Previous studies show that AV mobile study is still limited. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
-
6
Modelling of Crowd Evacuation with Communication Strategy Using Social Force Model
Published 2022“…As reported in many studies, real drill experiments have been conducted to validate the mobile crowd steering application. …”
Get full text
Get full text
Get full text
Article -
7
-
8
Deep Learning-Driven Mobility And Utility-Based Resource Management In Mm-Wave Enable Ultradense Heterogeneous Networks
Published 2025thesis::doctoral thesis -
9
A review of deep learning-based defect detection and panel localization for photovoltaic panel surveillance system
Published 2024“…YOLO algorithms are utilized for their real-time detection capabilities, allowing for immediate identification and categorization of defects during routine inspections. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Validation of vis-screen mobile application for easy vision test by general public: a pilot study
Published 2019Get full text
Get full text
Conference or Workshop Item -
11
-
12
-
13
Enhancement Of Static Code Analysis Malware Detection Framework For Android Category-Based Application
Published 2021“…The validation results show that Random Forest with 10-folds cross validation spitting dataset achieved 8 highest performance compared to benchmark study and two other classifiers. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…In machine learning algorithm, choosing the most relevant features for each attack is a very important requirement, especially in mobile ad hoc networks where the network topology dynamically changes. …”
Get full text
Get full text
Get full text
Thesis -
15
Q-learning based vertical handover decision algorithm in LTE-A two-tier macrocell-femtocell systems / Ammar Bathich
Published 2019“…The proposed handover algorithms are validated using the LTE-Sim simulator under an urban environment. …”
Get full text
Get full text
Thesis -
16
Text spam messages classification using Artificial Immune System (AIS) algorithms
Published 2024thesis::master thesis -
17
Android mobile malware detection model based on permission features using machine learning approach
Published 2022“…This study focused on the permission feature of Android mobile devices. …”
Get full text
Get full text
Thesis -
18
A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks / Salmah Fattah
Published 2022“…First, this research analyses the existing mobile underwater node deployment algorithms to identify the significant problems in existing solutions. …”
Get full text
Get full text
Get full text
Thesis -
19
A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks
Published 2022“…First, this research analyses the existing mobile underwater node deployment algorithms to identify the significant problems in existing solutions. …”
Get full text
Get full text
Get full text
Thesis -
20
ChoCD : Usable and secure graphical password authentication scheme
Published 2024thesis::master thesis
