Search Results - (( wave application a algorithm ) OR ( its applications mobile algorithm ))

Refine Results
  1. 1
  2. 2

    Cohesive token passing algorithm utilizing software agents by Abdulrazzak, A. Fua’ad, Subramaniam, Shamala

    Published 2010
    “…The communications domain has utilized the implementation of protocols for a wide spectrum of applications. This encompasses Medium Access Control (MAC) protocols. …”
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Secured mobile transaction using NFC Technology: Top-Up printing system by Ayu, Media Anugerah, Mantoro, Teddy, Brotosaputro, Gunawan, Ain, Nur F., Ghazali, Noorzalina

    Published 2011
    “…NFC technology has become a success across a broad range of applications depending on its large- scale adoption by enterprises and consumers. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  5. 5

    NFC secured online transaction in mobile computing business by Mantoro, Teddy, Ayu, Media Anugerah, Brotosaputro, Gunawan, Ain, Nur F., Ghazali, Noorzalina

    Published 2012
    “…NFC technology has become a success across a broad range of applications depending on its large-scale adoption by enterprises and consumers. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    A study of mobile IP and its security aspects in a LAN environment / Suhaila Che Ismail by Che Ismail, Suhaila

    Published 1998
    “…Mobility allows mobile node to communicate even distances away without restarting any applications in use. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    IMPLEMENTATION OF GRAPH BASED PATH PLANNING ALGORITHMS FOR INDOOR NAVIGATION by SYED KHAIZURA, SYED HUSEIN KAMIL

    Published 2018
    “…Thus, the A* algorithm is implemented in a small mobile robot, this is to see its effectiveness in real world application. …”
    Get full text
    Get full text
    Final Year Project
  10. 10
  11. 11
  12. 12

    Fuzzy Logic Based Self-Adaptive Handover Algorithm for MobileWiMAX. by Mohd Ali, Borhanuddin, Ismail, Alyani, Noordin, Nor Kamariah, Ben-Mubarak, Mohammed A., Ng , Ben Chee Kyun

    Published 2013
    “…Simulation results show that the proposed FuzSAHO algorithm reduces the number of ping-pong handover and its delay. …”
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15
  16. 16

    An algorithm for Elliott Waves pattern detection by Vantuch, T., Zelinka, I., Vasant, P.

    Published 2018
    “…The Random Decision Forest and the Support Vector Machine are the machine learning algorithms employed for this task. The accuracy of trend prediction above 70 proves the relevancy of EW patterns on stock market data as well as the validity of the algorithm as a tool for detection of such patterns. …”
    Get full text
    Get full text
    Article
  17. 17

    An algorithm for Elliott Waves pattern detection by Vantuch, T., Zelinka, I., Vasant, P.

    Published 2018
    “…The Random Decision Forest and the Support Vector Machine are the machine learning algorithms employed for this task. The accuracy of trend prediction above 70 proves the relevancy of EW patterns on stock market data as well as the validity of the algorithm as a tool for detection of such patterns. …”
    Get full text
    Get full text
    Article
  18. 18

    A new efficient checkpointing algorithm for distributed mobile computing by Mansouri, Houssem, Badache, Nadjib, Aliouat, Makhlouf, Pathan, Al-Sakib Khan

    Published 2015
    “…This algorithm is characterized by its efficiency and optimization in terms of incurred time-space overhead during checkpointing process and normal application running period.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20