Search Results - (( mobile application study algorithm ) OR ( user identification _ algorithm ))*
Search alternatives:
- user identification »
- application study »
-
1
A Comparative Study of Text Classifier for Mobile Crowdsensing Applications
Published 2024Proceedings Paper -
2
Stress mental health symptom assessment mobile application for young adults
Published 2023“…Mobile health applications, better known as “mHealth” applications, are getting popular nowadays. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
Convolutional neural network based mobile application for poisonous mushroom detection
Published 2025“…The application leverages a Convolutional Neural Network (CNN) algorithm to accurately classify mushrooms based on user-submitted images. …”
Get full text
Get full text
Get full text
Article -
4
-
5
A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim
Published 2017“…The content negotiation and adaptation architecture was implemented and validated through various laboratory experiments and field studies which the results highlight the importance of using token attributes matcher by eliminating the need of using the entire user agent strings for device identification and capabilities detection. …”
Get full text
Get full text
Thesis -
6
Non-Intrusive Electrical Load Monitoring and Identification: Approaches, Tools and a Case Study
Published 2023“…Therefore, integrating the Internet-of-Things (IoT) devices such as smart meters and mobile applications in a coherent framework would be one solution to achieving the desired changes in energy consumption behaviour. …”
Article -
7
Effective predicate identification algorithm for XML retrieval
Published 2018“…Finally, an effective predicate identification algorithm (EPIA) which uses EBQS and STPS to return relevant predicates is introduced. …”
Get full text
Get full text
Conference or Workshop Item -
8
Analysis of Online Social Network Connections for Identification of Influential Users
Published 2018“…This article presents a detailed survey of influential users’ identification algorithms and their performance evaluation approaches in OSNs. …”
Get full text
Get full text
Article -
9
-
10
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
Get full text
Get full text
Get full text
Thesis -
11
Development of person identification application for video surveillance
Published 2022“…The information of the tracker is necessary for person identification. Third, person identification implemented the CNN model for training. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Graphical user authentication algorithm for mobile banking user
Published 2018Get full text
Get full text
Get full text
Article -
13
Identifying the influential spreaders in multilayer interactions of online social networks
Published 2016“…The measurement results are found to be more reliable when the identification algorithms are applied to proposed topological representation compared when these algorithms are applied to single layer representations.…”
Get full text
Get full text
Article -
14
An efficient fuzzy clustering algorithm for mining user session clusters on web log data
Published 2021“…Because there are so many end-user sessions and URL resources, the size of web user session data is enormous. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Mobile technology generations and cryptographic algorithms: analysis study
Published 2016“…This paper provides analysis study of Mobile generations (From Mobile 1G to Mobile 4G) and cryptographic algorithms used in these generations. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
Eeg-Based Person Identification Using Multi-Levelwavelet Decomposition With Multi-Objective Flower Pollination Algorithm
Published 2020“…Recently, several studies showed that the brain electrical activity or electroencephalogram (EEG) signals provide unique features that can be considered as user identification techniques. But, it is a challenging task where there are three important things must be addressed carefully in any EEG-based person identification. …”
Get full text
Get full text
Thesis -
17
An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias
Published 2017“…Therefore, this project has proposed a method called token based alert notification. There are three algorithm developed for token based alert notification which is tokenization algorithm, token matching algorithm and item identification algorithm. …”
Get full text
Get full text
Thesis -
18
Effects of user selected conditions on modeling of dynamic systems using adaptive fuzzy model
Published 2001“…The implementation and the computational aspects of the training algorithm are also highlighted. Three examples of discrete-time nonlinear systems are used in the simulation study to show the effects of user selected conditions on the identification process. …”
Get full text
Get full text
Get full text
Article -
19
Performance evaluation of PID controller optimisation for wheel mobile robot using Bat based optimisation algorithm
Published 2022“…In this study, a new proposed hybrid optimization algorithm, called Extended Bat Algorithm (EBA) is used for optimizing the PID controller for the wheel mobile robot. …”
Get full text
Get full text
Book Chapter -
20
Smart cards and the fingerprint: a framework for user identification and authentication
Published 2003“…As a result, the research proposed a framework for user identification and authentication in automatic-teller-machine (ATM) systems using fingerprints and smart cards as opposed to the PIN and magnetic-stripe cards.…”
Get full text
Get full text
Get full text
Article
