Search Results - (( based evaluation method algorithm ) OR ( mobile information based algorithm ))

Refine Results
  1. 1

    Neighbour-based on-demand routing algorithms for mobile ad hoc networks by Ejmaa, Ali Mohamed E.

    Published 2017
    “…Accordingly, a Novel Density-Aware Routing algorithm (NDAR) is proposed. The proposed algorithm totally eliminates the need for fixed threshold values through the use of a novel formula that can easily estimate the node density and replace the fixed threshold value based on the neighbor information. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Pose estimation algorithm for mobile Augmented Reality based on inertial sensor fusion by Alam, Mir Suhail, Morshidi, Malik Arman, Gunawan, Teddy Surya, Olanrewaju, Rashidah Funke, Arifin, Fatchul

    Published 2021
    “…After extensive experiments, the validity of the proposed method was superior to the existing vision-based pose estimation algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias by Alias, Nur Farehah

    Published 2017
    “…Therefore, this project has proposed a method called token based alert notification. There are three algorithm developed for token based alert notification which is tokenization algorithm, token matching algorithm and item identification algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm by Enshaei, Mehdi

    Published 2015
    “…In this study, a new defence mechanism is proposed based on modification of the packet forwarding process, using Neighborhood Information (NI) and PT algorithm, and known as NIPT algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli by Dzulkifli, Muhammad Zulhilmie

    Published 2021
    “…The manual method often has a lack of knowledge that the menu that shows the customer does not provide any information that customers need, such as an image of the food or ingredients used in the menu. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A comprehensive overview of classical and modern route planning algorithms for self-driving mobile robots by Wan Daud, Wan Mohd Bukhari, Abu, Nur Syuhadah, Omar, Siti Nashayu, Sohaimeh, Shahirul Ashraf, Adli,, M. H.

    Published 2022
    “…Classical or traditional methods, such as Roadmaps (Visibility Graph and Voronoi Diagram), Potential Fields, and Cell Decomposition, and modern methodologies such as heuristic-based (Dijkstra Method, A* Algorithms, and D* Algorithms), metaheuristics algorithms (such as PSO, Bat Algorithm, ACO, and Genetic Algorithm), and neural systems such as fuzzy neural networks or fuzzy logic (FL) and Artificial Neural Networks (ANN) are described in this report. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Home buyer assistant using artificial bee colony algorithm / Muhammad Izzat Azri Azman by Azman, Muhammad Izzat Azri

    Published 2017
    “…The assistant will provide suitable house recommendation to a home buyer based on particular information house specification such as house price, locations neighbourhood and surrounding information. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Performance evaluation of Location-Sensitive Handoff using positioning method / Azuwa Ali and Saiful Fadzli Salian by Ali, Azuwa, Salian, Saiful Fadzli

    Published 2009
    “…Handoff performance is analyze based on the number of handoff occurred with respect to user mobility, fading and propagation effect. …”
    Get full text
    Get full text
    Research Reports
  10. 10

    Seamless vertical handover technique for vehicular ad-hoc networks using artificial bee colony-particle swarm optimisation by Abdulwahhab, Mohanad Mazin

    Published 2019
    “…Firstly, we proposed a multi-criteria artificial bee colony hybrid with particle swarm optimisation algorithm (MC ABC-PSO) for evaluating the information gathered from the mobile nodes in the handover. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Reduced Set Kernel Principal Component Analysis (Rskpca) Algorithm for Palm Print Based Mobile Biometric System by Ibrahim, Noor Salwani

    Published 2015
    “…In this study mobile biometric system based on palm print modality is developed. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Multi-sensor fusion based on multiple classifier systems for human activity identification by Nweke, Henry Friday, Teh, Ying Wah, Mujtaba, Ghulam, Alo, Uzoma Rita, Al-garadi, Mohammed Ali

    Published 2019
    “…To provide compact feature vector representation, we studied hybrid bio-inspired evolutionary search algorithm and correlation-based feature selection method and evaluate their impact on extracted feature vectors from individual sensor modality. …”
    Get full text
    Get full text
    Article
  13. 13

    Efficient management of Top-k queries over Uncertain Data Streams with dynamic Sliding Window Model by Raja Wahab, Raja Azhan Syah

    Published 2024
    “…Current research on tackling uncertainty revolves around creating specifically tailored algorithms that can operate in the presence of value uncertainty using both a count-based and a time-based approach. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    The classification of wink-based eeg signals by means of transfer learning models by Jothi Letchumy, Mahendra Kumar

    Published 2021
    “…It was demonstrated from the simulation investigation that the CWT model could yield a better signal transformation amongst the preprocessing algorithms. In addition, amongst the eighteen TL models evaluated based on the CWT transformation, fourteen was f ound to be able to extract the features reasonable, i.e., VGG16, VGG19, ResNet101, ResNet101 V2, ResNet152, ResNet152 V2, Inception V3, Inception ResNet V2, Xception, MobileNetV2, DenseNet 121, DenseNet 169, NasNetMobile and NasNetLarge. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Task offloading paradigm in mobile edge computing-current issues, adopted approaches, and future directions by Akhlaqi, Mohammad Yahya, Mohd Hanapi, Zurina

    Published 2023
    “…For each journal paper, the detailed information of the work area, targeted issue, formulation technique, optimization approach, adopted algorithms, evaluation techniques, performance matrices, dataset, utilized tools, and framework are extracted and analyzed using manual and automatic coding. …”
    Get full text
    Get full text
    Article
  16. 16

    Enhancing user authentication for cloud web-based application / Detar Beqo by Detar , Beqo

    Published 2018
    “…The proposed authentication method, uses an enhanced method where the credentials are encrypted through an algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Framework for stream clustering of trajectories based on temporal micro clustering technique by Abdulrazzaq, Musaab Riyadh

    Published 2018
    “…In the online phase, the stream clustering algorithm for trajectories based on the lifespan of the cluster is proposed (CC_TRS) to overcome the limitations of the time window technique. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Hybrid intelligent approach for network intrusion detection by Al-Mohammed, Wael Hasan Ali

    Published 2015
    “…Due to the prevailing limitations of finding novel attacks, high false detection, and accuracy in previous intrusion detection approaches, this study has proposed a hybrid intelligent approach for network intrusion detection based on k-means clustering algorithm and support vector machine classification algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The project's expected outcome is a GPS-Based Physical Identity and Access Management System with the selected lightweight geo-encryption algorithm that can be used to support the control access and management operations of UMS security division.…”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  20. 20

    REGION-BASED ADAPTIVE DISTRIBUTED VIDEO CODING CODEC by ABDELRAHMAN ELAMIN, ABDELRAHMAN ELAMIN

    Published 2011
    “…This work also prbposes a feedback-free region-based adaptive DVC solution in pixel domain based on machine learning approach to estimate the side information. …”
    Get full text
    Get full text
    Thesis