Search Results - (( developing mobile ad algorithm ) OR ( java application optimization algorithm ))

Refine Results
  1. 1
  2. 2

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Development of a Reliable Multicast Protocol in Mobile Ad Hoc Networks by Alahdal, Tariq A. A.

    Published 2008
    “…Mobile ad hoc network is a collection of mobile nodes forming dynamic and temporary network. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    A dynamic energy savvy routing algorithm for mobile Ad-hoc and sensor networks by Mohamad Nazim, Jambli, Adnan Shahid, Khan, Halikul, Lenando, Jiwa, Abdullah, Sinarwati, Mohamad Suhaili

    Published 2017
    “…Mobile Ad-hoc and Sensor Networks (MASNETs) are energy constrained networks which have been the focus of many recent research and development efforts. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Enhanced Ad Hoc On-Demand Distance Vector Routing Protocol For Mobile Ad Hoc Network Internet Connectivity by Gurusamy, Gobi

    Published 2006
    “…This evaluation is done by means of simulation using NS-2 developed by University California Berkeley. There are several ad hoc routing protocols, such as AODV, DSR, and DSDV that propose solutions for routing within a mobile ad hoc network. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Dynamic intrusion detection method for mobile ad hoc network using CPDOD algorithm by Abdel-Fatah, Farhan, Md Dahalin, Zulkhairi, Jusoh, Shaidah

    Published 2010
    “…Abstract Mobile Ad hoc networks (MANETs) are susceptible to several types of attacks due to their open medium, lack of centralized monitoring and management point, dynamic topology and other features. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Mobile game application development using evolutionary algorithms by Ong, Jia Hui

    Published 2014
    “…Hence it has opened up a whole new market with its mass among users and attracted a large number of smartphone application developers. Evolutionary Algorithms have never been used on mobile applications, thus it gives a novel idea of utilizing Evolutionary Algorithms in developing applications typically in games for mobile platforms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14

    Neighbour-based on-demand routing algorithms for mobile ad hoc networks by Ejmaa, Ali Mohamed E.

    Published 2017
    “…Mobile Ad hoc NETwork (MANET) is a set of wireless mobile nodes temporary connected without existing network infrastructure or centralized administrations. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Mobile student study planner by Chai, Jia Yuan

    Published 2020
    “…Therefore, this project entitled “Mobile Student Study Planner” is to implement a study planner as a mobile application with some added features as compared to the existing applications in the marketplace. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    Algorithms based on spider daddy long legs for finding the optimal route in securing mobile ad hoc networks by Ghathwan, Khalil Ibrahim

    Published 2016
    “…Mobile ad hoc networks (MANETs) are wireless networks that are subject to severe attacks, such as the black hole attack. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Performance evaluation of mobile ad hoc network in wireless LAN / Norfadhilah Hasan by Hasan, Norfadhilah

    Published 2005
    “…Mobile Ad-hoc Network (MANET) is becoming increasingly important in today's world and a number of protocols have been developed for them. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Mobile cookbook application with searching by ingredients / Falihah Mamat @ Mohammad by Mamat @ Mohammad, Falihah

    Published 2015
    “…Frustrating things when preparing a meal is forgetting the key ingredients.Through this project, a cookbook mobile application will be developed using agile framework. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method by Fahad, Ahmed Mohammed, Ahmed, Abdulghani Ali, Alghushami, Abdullah H., Alani, Sammer

    Published 2019
    “…Security is a critical problem in implementing mobile ad hoc networks (MANETs) because of their vulnerability to routing attacks. …”
    Get full text
    Get full text
    Get full text
    Book Chapter