Search Results - (( java implementation cell algorithm ) OR ( parameter program mobiliti algorithm ))
Search alternatives:
- java implementation »
- implementation cell »
- mobiliti algorithm »
- cell algorithm »
- parameter »
-
1
Quality of service in mobile IP networks with parametric multi-channel routing algorithms based on linear programming approach
Published 2018“…This approach tunes the parameters of the linear programming models that are used in the other algorithms by using a dynamic element. …”
Get full text
Get full text
Thesis -
2
Effects of Authentication of Users in Mobile Internet Protocol Version 6
Published 2004“…The password system is also recommended as a viable solution for this authentication as its implementation is most convenient for mobile users. A password algorithm is proposed from which a program can be written in any language deemed suitable.…”
Get full text
Get full text
Thesis -
3
-
4
Development of robust control scheme for wheeled mobile robot in restricted environment
Published 2021“…A novel algorithm so called laser simulator logic (LSL) has been develo ped to estimate the inertia moment when the environment is noisy and cannot use fuzzy logic algorithm. …”
Get full text
Get full text
Thesis -
5
A coverage path planning approach for autonomous radiation mapping with a mobile robot
Published 2023Article -
6
Enhancing navigation accuracy of Turtlebot3 Burger mobile robot
Published 2024“…To address this challenge, the Kalman Filter algorithm is implemented in this robot, as it is widely used for mobile robot navigation and system integration. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Hybrid Energy Encryption of Wireless Power Transfer Algorithm for Near Field Range
Published 2024thesis::doctoral thesis -
8
Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector
Published 2018“…The OMNET++ simulation program is used to justify the proposed algorithms. …”
Get full text
Get full text
Get full text
Thesis -
9
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The obvious amount of lost money of victims has led to many court cases where victim and theft claims the ownership of the program and the winner is who has a good lawyer. Many programming languages are used for programming; Java programming language is known to be most common due to its features, the use of this popular language increases an attacker's ability to steal intellectual property (IP), as the source program is translated to an intermediate format retaining most of the information such as meaningful variables names present in source code. …”
Get full text
Get full text
Thesis
