Search Results - (( based evaluation method algorithm ) OR ( mobile information system algorithm ))
Search alternatives:
- mobile information »
- information system »
- based evaluation »
- method algorithm »
- system algorithm »
-
1
Pose estimation algorithm for mobile Augmented Reality based on inertial sensor fusion
Published 2021“…After extensive experiments, the validity of the proposed method was superior to the existing vision-based pose estimation algorithms. …”
Get full text
Get full text
Get full text
Article -
2
Neighbour-based on-demand routing algorithms for mobile ad hoc networks
Published 2017“…The dropping decision of the redundant RREQ in the NCPR algorithm completely relies on preset variables, such variables require to be set by the system administrator based on the scenario. …”
Get full text
Get full text
Get full text
Thesis -
3
Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli
Published 2021“…Based on the previous report, some issues arise, such as time-consumption between the staff and the customer when ordering, lack of details and inconsistency of the manual system data. …”
Get full text
Get full text
Thesis -
4
A comprehensive overview of classical and modern route planning algorithms for self-driving mobile robots
Published 2022“…Classical or traditional methods, such as Roadmaps (Visibility Graph and Voronoi Diagram), Potential Fields, and Cell Decomposition, and modern methodologies such as heuristic-based (Dijkstra Method, A* Algorithms, and D* Algorithms), metaheuristics algorithms (such as PSO, Bat Algorithm, ACO, and Genetic Algorithm), and neural systems such as fuzzy neural networks or fuzzy logic (FL) and Artificial Neural Networks (ANN) are described in this report. …”
Get full text
Get full text
Get full text
Article -
5
An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias
Published 2017“…Therefore, this project has proposed a method called token based alert notification. There are three algorithm developed for token based alert notification which is tokenization algorithm, token matching algorithm and item identification algorithm. …”
Get full text
Get full text
Thesis -
6
Performance evaluation of Location-Sensitive Handoff using positioning method / Azuwa Ali and Saiful Fadzli Salian
Published 2009“…Handoff is one of the most important processes in mobile communication system. Radio resource management planning effectiveness depends on the successfulness of handoff process in maintaining the connection. …”
Get full text
Get full text
Research Reports -
7
-
8
Reduced Set Kernel Principal Component Analysis (Rskpca) Algorithm for Palm Print Based Mobile Biometric System
Published 2015“…In this study mobile biometric system based on palm print modality is developed. …”
Get full text
Get full text
Thesis -
9
Mobility-aware Offloading Decision For Multi-access Edge Computing In 5g Networks
Published 2024journal::journal article -
10
Seamless vertical handover technique for vehicular ad-hoc networks using artificial bee colony-particle swarm optimisation
Published 2019“…Firstly, we proposed a multi-criteria artificial bee colony hybrid with particle swarm optimisation algorithm (MC ABC-PSO) for evaluating the information gathered from the mobile nodes in the handover. …”
Get full text
Get full text
Thesis -
11
Multi-sensor fusion based on multiple classifier systems for human activity identification
Published 2019“…To provide compact feature vector representation, we studied hybrid bio-inspired evolutionary search algorithm and correlation-based feature selection method and evaluate their impact on extracted feature vectors from individual sensor modality. …”
Get full text
Get full text
Article -
12
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…The proposed authentication method, uses an enhanced method where the credentials are encrypted through an algorithm. …”
Get full text
Get full text
Get full text
Thesis -
13
Hybrid intelligent approach for network intrusion detection
Published 2015“…Hence, there must be substantial improvement in network intrusion detection techniques and systems. Due to the prevailing limitations of finding novel attacks, high false detection, and accuracy in previous intrusion detection approaches, this study has proposed a hybrid intelligent approach for network intrusion detection based on k-means clustering algorithm and support vector machine classification algorithm. …”
Get full text
Get full text
Get full text
Thesis -
14
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…(iii) To evaluate the usability performance of the developed GPS-Based Physical Identity and Access Management (PIAM) System by using the System Usability Scale (SUS) approach. …”
Get full text
Get full text
Get full text
Academic Exercise -
15
Personalized job recommender system using content-based filtering for UiTM Machang graduates
Published 2025“…Traditional methods for finding jobs include inefficiencies in irrelevant job listing and inability to provide personalized recommendations based on the user's specific skills, career goals, and preferences. …”
Get full text
Get full text
Student Project -
16
Framework for stream clustering of trajectories based on temporal micro clustering technique
Published 2018“…A comprehensive experimental analysis was conducted to evaluate the efficiency and effectiveness of the proposed algorithms (ONF-TRS, CC-TRS). …”
Get full text
Get full text
Thesis -
17
Design of a Fuzzy Logic Controller for Skid Steer Mobile Robot
Published 2009“…Data acquisition is done in a LABVIEW and a MATLAB control algorithm is called in LABVIEW. A real mobile robot, PUTRABOT2 was used to conduct the experiment. …”
Get full text
Get full text
Thesis -
18
REGION-BASED ADAPTIVE DISTRIBUTED VIDEO CODING CODEC
Published 2011“…Although the performance evaluations show rate-penalty but it is acceptable considering the simplicity of the proposed algorithm. …”
Get full text
Get full text
Thesis -
19
Content-based indexing of low resolution documents
Published 2016“…The assessment of the proposed indexing scheme is conducted based on recall and precision, a standard CBIR retrieval performance evaluation. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Analysis of confidentiality algorithms in different mobile generations
Published 2017“…Various sensitive information (e.g. emails, bank transactions, voice calls, ... ) was exchanged via the mobile systems. …”
Get full text
Get full text
Get full text
Proceeding Paper
