Search Results - (( mobile information system algorithm ) OR ( java simulation optimization algorithm ))

Refine Results
  1. 1
  2. 2

    Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing by Husna, Jamal Abdul Nasir

    Published 2011
    “…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources. A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Ant colony optimization algorithm for load balancing in grid computing by Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2012
    “…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
    Get full text
    Get full text
    Get full text
    Monograph
  4. 4

    Analysis of confidentiality algorithms in different mobile generations by Jassim, Khalid Fadhil, Alshaikhli, Imad Fakhri Taha

    Published 2017
    “…Various sensitive information (e.g. emails, bank transactions, voice calls, ... ) was exchanged via the mobile systems. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  5. 5

    Mobile Map-Based Positioning System Using Segmentation Algorithm (MM-BPS) by Migdady, Hazem Moh'd Ali

    Published 2008
    “…This paper reports steps to build a segmentation positioning algorithm and to implement Mobile Map-Based Positioning System prototype.…”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Map navigation for mobile tourist / Rohana Abd Jalil by Abd Jalil, Rohana

    Published 2007
    “…Recent years have seen rapid growth in the area of map-based mobile application system for tourist information services. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Comparative study of some symmetric ciphers in mobile systems by Jassim, Khalid Fadhil, Alshaikhli, Imad Fakhri Taha

    Published 2014
    “…Symmetric cryptographic algorithms have been proposed to protect the information of the senders and receivers through mobile systems. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
    Review
  9. 9
  10. 10
  11. 11

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  12. 12

    TRIP PLANNER MOBILE APPLICATION FOR SARAWAK TOURIST WITH USING INTELLIGENT AGENT BASED DECISION MAKING ALGORITHMS by Teh, Khee Shin

    Published 2020
    “…Thus, the proposed system which is trip planner mobile application for Sarawak tourist with using intelligent agent based decision making algorithms may help to resolve the problem. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  13. 13

    Mobile robot safe navigation in unknown environment by Shayestegan, Mohsen, Marhaban, Mohammad Hamiruce

    Published 2012
    “…Furthermore, the mobile robot does not suffer from typical ushape environment by a planned local minimum trapping algorithm and also designed controller is easy to understand, simple, and not sensitive to the system model parameters. …”
    Get full text
    Conference or Workshop Item
  14. 14

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…SANAsms or Short Messaging System (SMS) Encryption System is as application on mobile phone that enables to send, receive and store encrypted text messages. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Outdoor marker-less tracking and pose calculating system for mobile augmented reality by Rehman, Ullah Khan

    Published 2014
    “…A proof of concept mobile AR system is implemented as part of this thesis. …”
    Get full text
    Get full text
    Thesis
  17. 17

    WCDMA forward link capacity improvement by using adaptive antenna with genetic algorithm assisted MDPC beamforming technique by Kiong T.S., Ismail M., Hassan A.

    Published 2023
    “…In order to increase the mobile communication system capacity without jeopardizing the system QoS, smart antenna is usually being suggested. …”
    Article
  18. 18
  19. 19

    OBJECTS RECOGNITION AND POSE CALCULATION SYSTEM FOR MOBILE AUGMENTED REALITY USING NATURAL FEATURES by Rehman Ullah, Khan, Shahren, Ahmad Zaidi Adruce, Mohd Shahrizal, Sunar, Yahya, Khan, Yasir Hayat, Mughal

    Published 2015
    “…The system extracts natural features by using optimized “Speed up Robust Features” SURF algorithm for mobile architecture. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Secure mobile AES encryptor (SMAE) by Satia, Anbalagan

    Published 2016
    “…This can be proved where the National Security Agency (NSA) in the United States to encrypt confidential data and information. This application will focus more on the user of the Android operating systems based mobile phone users. …”
    Get full text
    Get full text
    Undergraduates Project Papers