Search Results - (( developing mobile mitigation algorithm ) OR ( java application optimization algorithm ))

Refine Results
  1. 1
  2. 2

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8

    Utilising MIMO for Location and Positioning in IMT -Advanced Systems by Awang Md Isa, Azmi

    Published 2010
    “…With the advances of multiple input multiple output (MIMO) technology as one of IMT-Advanced features, it has hecome feasible to adopt the technology into the mobile location scenario. By exploiting the multipath characteristics of the MIMO system, it is possible to estimate the position of mobile stations (MS) by considering the capability of MIMO to mitigate the non line of sight (NLOS) conditions that deteriorate the accuracy of location estimation. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10

    Computer Lab Timetabling Using Genetic Algorithm Case Study - Unit ICT by Abdullah, Amran

    Published 2006
    “…Genetic Algorithm is one of the most popular optimization solutions used in various applications such as scheduling. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    MIMO Positioning for IMT-Advanced Systems Based on Geometry Approach in NLOS Environments by Awang Md Isa, Azmi

    Published 2011
    “…By exploiting the multipath characteristics of the MIMO system, it is possible to estimate the position of mobile stations (MS) by considering the capability of MIMO to mitigate the effects of non line of sight (NLOS) conditions. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Data-driven dynamic clustering framework for mitigating the adverse economic impact of Covid-19 lockdown practices by Rahman, Md. Arafatur, Nafees, Zaman, A. Taufiq, Asyhari, Al-Turjman, Fadi, Alam Bhuiyan, Md. Zakirul, Mohamad Fadli, Zolkipli

    Published 2020
    “…Through an intelligent fusion of healthcare and simulated mobility data, we model lockdown as a clustering problem and design a dynamic clustering algorithm for localized lockdown by taking into account the pandemic, economic and mobility aspects. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Examination timetabling using genetic algorithm case study: KUiTTHO by Mohd Salikon, Mohd Zaki

    Published 2005
    “…Genetic Algorithm (GA) is one of the most popular optimization solutions. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Detection of Counterfeit Telecommunication Products using Luhn Checksum Algorithm and an Adapted IMEI Authentication Method by Amusa, Morufu, Bamidele, Oluwade

    Published 2020
    “…This paper presents two authentication methods for detecting counterfeit and substandard telecommunication devices/products via the International Mobile Equipment Identity (IMEI) number. The first authentication method is the Luhn checksum algorithm, otherwise called Luhn formula or mod 10 algorithm. …”
    Get full text
    Get full text
    Journal
  16. 16

    Examination Timetabling Using Genetic Algorithm Case Study : KUiTTHO by Mohd. Zaki, Mohd. Salikon

    Published 2005
    “…Genetic Algorithm (GA) is one of the most popular optimization solutions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    An embedded database design and implementation of a parallel IEEE XTS storage encryption for mobile devices by Alomari, Mohammad Ahmed Mohammad

    Published 2017
    “…To ensure higher security level, the developed system is implemented using the NIST-certified XTS-AES block encryption algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method by Fahad, Ahmed Mohammed, Ahmed, Abdulghani Ali, Alghushami, Abdullah H., Alani, Sammer

    Published 2019
    “…Therefore, this authentication process must be further investigated to develop efficient security techniques. This paper proposes a solution for detecting black hole attacks on MANET by using harmony search algorithm (DBHSA), which uses harmony search algorithm (HSA) to mitigate the lateness problem caused by cooperative bait detection scheme (CBDS). …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  19. 19

    Donatenow: a crowdsourcing-based mobile application with geolocation and content-based filtering algorithm / Siti Rahayu Abdul Aziz and Nur Aqilah Balkis Hafiz Abu Bakar by Abdul Aziz, Siti Rahayu, Hafiz Abu Bakar, Nur Aqilah Balkis

    Published 2023
    “…The objective of this study is to develop a mobile application called DonateNow, designed to establish a charitable crowdsourcing system. …”
    Get full text
    Get full text
    Book Section
  20. 20

    Donatenow: a crowdsourcing-based mobile application with geolocation and content-based filtering algorithm / Siti Rahayu Abdul Aziz and Nur Aqilah Balkis Hafiz Abu Bakar by Abdul Aziz, Siti Rahayu, Hafiz Abu Bakar, Nur Aqilah Balkis

    Published 2023
    “…The objective of this study is to develop a mobile application called DonateNow, designed to establish a charitable crowdsourcing system. …”
    Get full text
    Get full text
    Book Section