Search Results - (( parallel optimization path algorithm ) OR ( data distributed mobile algorithm ))

Refine Results
  1. 1

    Tool path generation of contour parallel based on ant colony optimisation by Abdullah, Haslina, Ramli, Rizauddin, Abd Wahab, Dzuraidah, Abu Qudeiri, Jaber

    Published 2016
    “…An Ant Colony Optimisation (ACO) method is used to optimize the tool path length because of its capability to find the shortest tool path length. …”
    Get full text
    Get full text
    Article
  2. 2
  3. 3
  4. 4

    Multi-mobile agent itinerary planning algorithms for data gathering in wireless sensor networks: a review paper by Qadori, Huthiafa Q., Ahmad Zukarnain, Zuriati, Mohd Hanapi, Zurina, Subramaniam, Shamala

    Published 2017
    “…More importantly, the review showed that theses algorithms did not take into account the security of the data gathered by the mobile agent. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Restoration planning strategy of transmission system based on optimal energizing time of sectionalizing islands / Dian Najihah Abu Talib by Dian Najihah , Abu Talib

    Published 2019
    “…There are two discrete optimization techniques used in this work, which are the Artificial Bee Colony algorithm and Evolutionary Programming. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    A spawn mobile agent itinerary planning approach for energy-efficient data gathering in wireless sensor networks by Q. Qadori, Huthiafa, Ahmad Zulkarnain, Zuriati, Mohd Hanapi, Zurina, Subramaniam, Shamala

    Published 2017
    “…The MA-based approach employs two algorithms: Single-agent Itinerary Planning (SIP) and Multi-mobile agent Itinerary Planning (MIP) for energy-efficient data gathering. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    An Analysis of Node/Peer Discovery Approach and Routing Algorithms in Mobile & Traditional Peer-to-Peer Networks by Abdullahi, Mohamed Omar

    Published 2012
    “…Mobile devices are becoming an increasingly indispensable part of people’s everyday life, in the form of mobile phones, PDAs and laptop computers to communicate or share data between them. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Performance Analysis of Swarm Intelligence-Based Routing Protocol for Mobile Ad Hoc Network and Wireless Mesh Networks by Moghanjoughi, Ayyoub Akbari

    Published 2009
    “…But there are several shortcomings including the freezing problem of the optimum path, traffic engineering, and to link failure due to nodes mobility in wireless mobile networks. The metaheuristic and distributed route discovery for data load management in Wireless Mesh Networks (WMNs) and Mobile Ad-hoc Network (MANET) are fundamental targets of this study. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Secure policies for the distributed virtual machines in mobile cloud computing by Annane, Boubakeur

    Published 2020
    “…However, the lack of security aspect impedes the benefits of virtualization techniques, whereby malicious users can violate and damage sensitive data in distributed Virtual Machines (VMs). Thus, this study aims to provide protection of distributed VMs and mobile user’s sensitive data in terms of security and privacy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Optimized routing algorithm for mobile multicast source in Wireless Mesh Networks by Sanni, Mistura Laide, Hassan Abdalla Hashim, Aisha, Hassan, Wan Haslina, Anwar, Farhat, Ahmed, Gharib Subhi Mahmoud

    Published 2015
    “…Mobility considerations in multicast algorithm design usually focus issues of mobile receivers while few researches emphasize on mobile multicast sources issues. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    A novel large-bit-size architecture and microarchitecture for the implementation of Superscalar Pipeline VLIW microprocessors by Lee, Weng Fook

    Published 2008
    “…Different adder architectures are investigated for suitability on synthesis implementation of large data bus size adder for efficient usage within the ALU. An adder algorithm using repetitive constructs in a parallel algorithm that allows for efficient and optimal synthesis for large data bus size is proposed as a suitable implementation for the adder within the ALU. …”
    Get full text
    Thesis
  12. 12

    Secured route optimization in mobile IPv6 wireless networks in terms of data integrity by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm at a cost of a small increase in delay. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    WCDMA teletraffic performance improvement via power resource optimization using distributed parallel genetic algorithm by Prajindra S.K., Tiong S.K., Johnny Koh S.P., Yap D.F.W.

    Published 2023
    “…WCDMA mobile communication systems provide enhanced high-speed data, multimedia, and voice services to mobile users. …”
    Conference paper
  14. 14

    Enhancing the QoS performance for mobile station over LTE and WiMAX networks / Mhd Nour Hindia by Hindia, Mhd Nour

    Published 2015
    “…On the first level, bankruptcy and shapely value algorithm fairly distribute resources among smart grid applications. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    A novel scheduling algorithm based on game theory and multicriteria decision making in LTE network by Hindia, M.N., Reza, A.W., Noordin, K.A.

    Published 2015
    “…On the first level, bankruptcy and shapely value algorithm fairly distribute the resources among smart grid applications. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques by Farhan, Farhan Abdel-Fattah Ahmad

    Published 2011
    “…The MANET environment is particularly vulnerable because of the characteristics of mobile ad hoc networks such as open medium, dynamic topology, distributed cooperation, and constrained capability. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing by Goh, Kwang Yi

    Published 2023
    “…Furthermore, the proposed techniques based on the QLearning algorithm do not consider context-based actions. Thus, these techniques are unable to detect failures that occur due to the improper use of context data, which is becoming an increasingly common issue in mobile applications nowadays. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    MMS : mobile monitoring system using electrical capacitance tomography (ECT) by Abdul Rahim, Ruzairi, Chan, Kok Seong

    Published 2008
    “…The information obtained in the PC can be reconstructed using linear back projection algorithm. In order to improve data result, iterative algorithm has been implemented in this system in order to obtain a precise image of the flow in the pipeline.…”
    Get full text
    Get full text
    Monograph