Search Results - (( mobile evaluation method algorithm ) OR ( data optimization method algorithm ))
Search alternatives:
- mobile evaluation »
- evaluation method »
- data optimization »
- method algorithm »
-
1
Quality of service in mobile IP networks with parametric multi-channel routing algorithms based on linear programming approach
Published 2018“…Furthermore, Optimized Parametric Topology Control Routing algorithm performs significantly better than Triangular Routing Method and Change Foreign Agent Algorithm. …”
Get full text
Get full text
Thesis -
2
Delay and energy-aware routing for efficient data collection in wireless sensor networks / Ihsan Ali
Published 2024“…The hybrid method, IDBA-AFW, aims to enhance the original IDBA by incorporating the Adaptive Floyd-Warshall algorithm for graph transformation and optimization. …”
Get full text
Get full text
Get full text
Thesis -
3
Route optimization security in mobile IPv6 wireless networks: a test-bed experience
Published 2008“…In this paper, focus is given on enhanced security scheme in terms of RO based Test-bed evaluation experiment. An enhanced security algorithm is developed on top of MIPv6 RO to secure data. …”
Get full text
Get full text
Conference or Workshop Item -
4
Security enhancement of route optimization in mobile IPv6 networks
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Get full text
Article -
5
Optimizing the performance of mobile malware detection using the indexing rule
Published 2024journal::journal article -
6
Deep Learning-Driven Mobility And Utility-Based Resource Management In Mm-Wave Enable Ultradense Heterogeneous Networks
Published 2025thesis::doctoral thesis -
7
Multi-objective optimization for integrated task scheduling and load balancing in fog computing for IoT applications
Published 2025“…By using a task scheduling and offloading method, the FOCS algorithm arranges data according to size and sends it to the appropriate fog nodes. …”
Get full text
Get full text
Get full text
Thesis -
8
Efficient management of Top-k queries over Uncertain Data Streams with dynamic Sliding Window Model
Published 2024“…The experiments in this study compare the SWMTop-kDelta algorithm with two previous researchers and two baseline approach algorithms to evaluate their effectiveness. …”
Get full text
Get full text
Get full text
Thesis -
9
Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method
Published 2019Get full text
Get full text
Get full text
Book Chapter -
10
Task offloading paradigm in mobile edge computing-current issues, adopted approaches, and future directions
Published 2023“…For each journal paper, the detailed information of the work area, targeted issue, formulation technique, optimization approach, adopted algorithms, evaluation techniques, performance matrices, dataset, utilized tools, and framework are extracted and analyzed using manual and automatic coding. …”
Get full text
Get full text
Article -
11
Controller placement problem in the optimization of 5G based SDN and NFV architecture
Published 2021“…If the control plane fails to improve system resilience quality, A reliable RAMCP is formulated as an optimal solution for fault tolerance. Furthermore, the approach is extended with a Particle Swarm Algorithm (PSO) and presented as a hybrid RASCP to validate the optimal location and number of controllers. …”
Get full text
Get full text
Thesis -
12
Transformation path of modern media from the perspective of internet of things
Published 2022“…To improve the security of the data, we propose Robust Modern Media Data Encryption (RMMDE) algorithm with Enhance Cuckoo Swarm Optimization (ECSO) algorithm. …”
Get full text
Get full text
Article -
13
Optimal solution to the fractional knapsack problem for LTE overload-state scheduling
Published 2016“…System performance has been evaluated in terms of loss, delay and throughput in comparison with reference algorithms.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Comprehensive review of drones collision avoidance schemes: challenges and open issues
Published 2024“…We explore collision avoidance methods for UAVs from various perspectives, categorizing them into four main groups: obstacle detection and avoidance, collision avoidance algorithms, drone swarm, and path optimization. …”
Get full text
Get full text
Get full text
Article -
15
Framework for stream clustering of trajectories based on temporal micro clustering technique
Published 2018“…A comprehensive experimental analysis was conducted to evaluate the efficiency and effectiveness of the proposed algorithms (ONF-TRS, CC-TRS). …”
Get full text
Get full text
Thesis -
16
The classification of wink-based eeg signals by means of transfer learning models
Published 2021“…This study aimed to explore the performance of different pre-processing methods, namely Fast Fourier Transform, Short-Time Fourier Transform, Discrete Wavelet Transform, and Continuous Wavelet Transform (CWT) that could allow TL models to extract features from the images generated and classify through selected classical ML algorithms . …”
Get full text
Get full text
Thesis -
17
Comparative Analysis of Pneumonia Detection from Chest X-Ray Images Using CNN And Transfer Learning
Published 2024“…On a dataset of accessible pneumonia X-rays, the method was tested. This research shows which neural network algorithm is optimal for detecting pneumonia, and how medical practitioners might use it in the actual world. …”
Get full text
Get full text
Get full text
Article -
18
Customer mobile behavioral segmentation and analysis in telecom using machine learning
Published 2021“…Unsupervised machine learning algorithm K-means was used to cluster the data, and these results were analyzed and labeled with labels and descriptions. …”
Get full text
Get full text
Article -
19
-
20
