Search Results - (( mobile evaluation method algorithm ) OR ( using optimization method algorithm ))
Search alternatives:
- mobile evaluation »
- evaluation method »
- method algorithm »
-
1
Cognitive map approach for mobility path optimization using multiple objectives genetic algorithm
Published 2023Subjects:Conference Paper -
2
Quality of service in mobile IP networks with parametric multi-channel routing algorithms based on linear programming approach
Published 2018“…Furthermore, Optimized Parametric Topology Control Routing algorithm performs significantly better than Triangular Routing Method and Change Foreign Agent Algorithm. …”
Get full text
Get full text
Thesis -
3
Performance evaluation of PID controller parameters gain optimization for wheel mobile robot based on bat algorithm and particle swarm optimization
Published 2019“…The selection of PTD gains for such system is highly difficult. Optimization of PID controller using Bat Algorithm (BA) is presented in this paper. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks / Salmah Fattah
Published 2022“…Finally, the proposed algorithm’s effectiveness regarding node coverage, energy consumption, Pareto-optimal value, and algorithm execution time is validated using three Pareto-optimal metrics: including inverted generation distance (IGD), hypervolume, and diversity. …”
Get full text
Get full text
Get full text
Thesis -
5
A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks
Published 2022“…Finally, the proposed algorithm's effectiveness regarding node coverage, energy consumption, Pareto-optimal value, and algorithm execution time is validated using three Pareto-optimal metrics: including inverted generation distance (IGD), hypervolume, and diversity. …”
Get full text
Get full text
Get full text
Thesis -
6
Delay and energy-aware routing for efficient data collection in wireless sensor networks / Ihsan Ali
Published 2024“…The hybrid method, IDBA-AFW, aims to enhance the original IDBA by incorporating the Adaptive Floyd-Warshall algorithm for graph transformation and optimization. …”
Get full text
Get full text
Get full text
Thesis -
7
Optimizing the performance of mobile malware detection using the indexing rule
Published 2024journal::journal article -
8
Performance evaluation of PID controller parameters gain optimization for wheel mobile robot based on bat algorithm and particle swarm optimization
Published 2019“…The result of tuning and optimizing PID gains using BA is compared with Particle Swarm Optimization (PSO). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Route optimization security in mobile IPv6 wireless networks: a test-bed experience
Published 2008“…Route Optimization (RO) is standard in Mobile IPv6 (MIPv6) to route packets between Mobile Node (MN) and Correspondent Node (CN) using shortest possible path. …”
Get full text
Get full text
Conference or Workshop Item -
10
Security enhancement of route optimization in mobile IPv6 networks
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Get full text
Article -
11
A selective approach for energy-aware video content adaptation decision-taking engine in android based smartphone
Published 2019“…Subjective evaluation by selected respondents are also has been made using Absolute Category Rating method as recommended by ITU to evaluate EnVADE algorithm in term of QoE. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
A selective approach for energy-aware video content adaptation decision-taking engine in android based smartphone
Published 2019“…Subjective evaluation by selected respondents are also has been made using Absolute Category Rating method as recommended by ITU to evaluate EnVADE algorithm in term of QoE. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Deep Learning-Driven Mobility And Utility-Based Resource Management In Mm-Wave Enable Ultradense Heterogeneous Networks
Published 2025thesis::doctoral thesis -
14
Performance evaluation of Location-Sensitive Handoff using positioning method / Azuwa Ali and Saiful Fadzli Salian
Published 2009“…This project investigate the performance of handoff process with the help of location information which is called Location-Sensitive Handoff (L-SH) using the location positioning method. Location positioning method chosen in L-SH is Observed-Time Difference of Arrival (OTDOA). …”
Get full text
Get full text
Research Reports -
15
Thrust optimization of linear oscillatory actuator using permeance analysis method
Published 2011“…The first method is by evaluating the calculation output. The second method is by using generic algorithm. …”
Get full text
Article -
16
Electroencephalogram signal interpretation system for mobile robot
Published 2013“…Using sample datasets, the EEG signal is analyzed to determine the most suitable scalp area for P300 detection, while optimization with genetic algorithm (GA) is developed to select best four channels. …”
Get full text
Get full text
Thesis -
17
3D virtual modelling and stabilization control of triple links inverted pendulum on two-wheeled system using enhanced interval type-2 fuzzy logic control
Published 2020“…Two optimization algorithms are presented in this work which are Spiral Dynamic Algorithm (SDA) and Particle Swarm Optimization (PSO). …”
Get full text
Get full text
Thesis -
18
Thrust Optimization of Linear Oscillatory Actuator Using Permeance Analysis Method.
Published 2011“…The thrust of LOA was optimized by using permeance analysis method (PAM). …”
Get full text
Get full text
Article -
19
Modeling and Analysis of New Hybrid Clustering Technique for Vehicular Ad Hoc Network
Published 2023“…The K-Means clustering algorithm is an effective algorithm for multi-clusters that can be used in VANETs. …”
Article -
20
Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method
Published 2019Get full text
Get full text
Get full text
Book Chapter
