Search Results - (( developing mobile mitigation algorithm ) OR ( java application optimization algorithm ))
Search alternatives:
- application optimization »
- mitigation algorithm »
- mobile mitigation »
- java application »
-
1
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
2
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
Get full text
Get full text
Conference or Workshop Item -
3
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
4
-
5
-
6
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
7
Ant colony optimization algorithm for load balancing in grid computing
Published 2012Get full text
Get full text
Get full text
Monograph -
8
Utilising MIMO for Location and Positioning in IMT -Advanced Systems
Published 2010“…With the advances of multiple input multiple output (MIMO) technology as one of IMT-Advanced features, it has hecome feasible to adopt the technology into the mobile location scenario. By exploiting the multipath characteristics of the MIMO system, it is possible to estimate the position of mobile stations (MS) by considering the capability of MIMO to mitigate the non line of sight (NLOS) conditions that deteriorate the accuracy of location estimation. …”
Get full text
Get full text
Conference or Workshop Item -
9
-
10
Computer Lab Timetabling Using Genetic Algorithm Case Study - Unit ICT
Published 2006“…Genetic Algorithm is one of the most popular optimization solutions used in various applications such as scheduling. …”
Get full text
Get full text
Thesis -
11
-
12
MIMO Positioning for IMT-Advanced Systems Based on Geometry Approach in NLOS Environments
Published 2011“…By exploiting the multipath characteristics of the MIMO system, it is possible to estimate the position of mobile stations (MS) by considering the capability of MIMO to mitigate the effects of non line of sight (NLOS) conditions. …”
Get full text
Get full text
Get full text
Article -
13
Data-driven dynamic clustering framework for mitigating the adverse economic impact of Covid-19 lockdown practices
Published 2020“…Through an intelligent fusion of healthcare and simulated mobility data, we model lockdown as a clustering problem and design a dynamic clustering algorithm for localized lockdown by taking into account the pandemic, economic and mobility aspects. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Examination timetabling using genetic algorithm case study: KUiTTHO
Published 2005“…Genetic Algorithm (GA) is one of the most popular optimization solutions. …”
Get full text
Get full text
Thesis -
15
Detection of Counterfeit Telecommunication Products using Luhn Checksum Algorithm and an Adapted IMEI Authentication Method
Published 2020“…This paper presents two authentication methods for detecting counterfeit and substandard telecommunication devices/products via the International Mobile Equipment Identity (IMEI) number. The first authentication method is the Luhn checksum algorithm, otherwise called Luhn formula or mod 10 algorithm. …”
Get full text
Get full text
Journal -
16
Examination Timetabling Using Genetic Algorithm Case Study : KUiTTHO
Published 2005“…Genetic Algorithm (GA) is one of the most popular optimization solutions. …”
Get full text
Get full text
Get full text
Thesis -
17
An embedded database design and implementation of a parallel IEEE XTS storage encryption for mobile devices
Published 2017“…To ensure higher security level, the developed system is implemented using the NIST-certified XTS-AES block encryption algorithm. …”
Get full text
Get full text
Get full text
Thesis -
18
Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method
Published 2019“…Therefore, this authentication process must be further investigated to develop efficient security techniques. This paper proposes a solution for detecting black hole attacks on MANET by using harmony search algorithm (DBHSA), which uses harmony search algorithm (HSA) to mitigate the lateness problem caused by cooperative bait detection scheme (CBDS). …”
Get full text
Get full text
Get full text
Book Chapter -
19
Donatenow: a crowdsourcing-based mobile application with geolocation and content-based filtering algorithm / Siti Rahayu Abdul Aziz and Nur Aqilah Balkis Hafiz Abu Bakar
Published 2023“…The objective of this study is to develop a mobile application called DonateNow, designed to establish a charitable crowdsourcing system. …”
Get full text
Get full text
Book Section -
20
Donatenow: a crowdsourcing-based mobile application with geolocation and content-based filtering algorithm / Siti Rahayu Abdul Aziz and Nur Aqilah Balkis Hafiz Abu Bakar
Published 2023“…The objective of this study is to develop a mobile application called DonateNow, designed to establish a charitable crowdsourcing system. …”
Get full text
Get full text
Book Section
