Search Results - (( mobile detection means algorithm ) OR ( based replication laws algorithm ))*
Search alternatives:
- based replication »
- mobile detection »
- replication laws »
- detection means »
- means algorithm »
- laws algorithm »
-
1
-
2
UTeM navigation system: pedestrian and traffic sign detection using CNN algorithm
Published 2022“…The system using algorithm using CNN as an algorithm and the architecture used is Tiny-YOLOv2 to detect traffic signs and pedestrians. …”
Get full text
Get full text
Get full text
Article -
3
-
4
Hybrid intelligent approach for network intrusion detection
Published 2015“…Hence, there must be substantial improvement in network intrusion detection techniques and systems. Due to the prevailing limitations of finding novel attacks, high false detection, and accuracy in previous intrusion detection approaches, this study has proposed a hybrid intelligent approach for network intrusion detection based on k-means clustering algorithm and support vector machine classification algorithm. …”
Get full text
Get full text
Get full text
Thesis -
5
Enhancement of Space-Time Receiver Structure with Multiuser Detection for Wideband CDMA Communication Systems
Published 2006“…We consider two different pilot symbol assisted adaptive beamforming algorithms, Least Mean Square (LMS) and Recursive Least Square (RLS). …”
Get full text
Get full text
Thesis -
6
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…The mean path cost generated by the LS algorithm, on the other hand, is 14% higher than that generated by the PRM. …”
Get full text
Thesis -
7
Enhanced Ad Hoc On-Demand Distance Vector Routing Protocol For Mobile Ad Hoc Network Internet Connectivity
Published 2006“…Moreover, three proposed approaches for gateway discovery are implemented; propose a forwarding algorithm, and route determination algorithm for default route and host route in MANET are investigated.…”
Get full text
Get full text
Thesis -
8
Efficient NASNetMobile-enhanced Vision Transformer for weakly supervised video anomaly detection
Published 2026“…Second, we employed a pretrained, low-parameter NASNetMobile algorithm that efficiently extracts fine-grained local spatial details. …”
Get full text
Get full text
Article -
9
A noble approach of ACO algorithm for WSN
Published 2018“…Using the proposed ACO algorithm and considering both the node mobility and the existing energy of the nodes, an optimum route and best cost from the originating node to the target node can be detected. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
10
An active lower-extremity exoskeleton for synchronous mobility assistance in lifting and carrying manual handling task / Sado Fatai
Published 2019“…In this study, a new 12-DOF lower extremity EHPA called UMExoLEA (Universiti Malaya Exoskeleton for Lower Extremity Augmentation) with 4-active bi-directional brushless DC motor actuation and a novel synchronous mobility control algorithm are developed to provide smooth lower-extremity mobility augmentation in lifting/carrying MH works. …”
Get full text
Get full text
Get full text
Thesis -
11
Location-Based Approach for Route Maintenance in Dynamic Source Routing Protocol
Published 2008“…The objectives of this research are to propose new algorithm to detect route failure as early warning message to the protocol to take further action, and to propose new algorithm for DSR route maintenance to response the early warning message from route failure detection algorithm. …”
Get full text
Get full text
Thesis -
12
-
13
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
Published 2021“…Mobile Cloud Computing (MCC) is the combination of cloud computing, mobile computing, and wireless network to bring rich computational resources to mobile users, network operators, as well as cloud computing providers. …”
Get full text
Get full text
Thesis -
14
Bacterial image analysis using multi-task deep learning approaches for clinical microscopy
Published 2024“…Methods Three object detection networks of DL algorithms, namely SSD-MobileNetV2, EfficientDet, and YOLOv4, were developed to automatically detect Escherichia coli (E. coli) bacteria from microscopic images. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Optimising acoustic features for source mobile device identification using spectral analysis techniques / Mehdi Jahanirad
Published 2016“…The context model allows computing the mobile device intrinsic fingerprints for the source mobile device identification. …”
Get full text
Get full text
Thesis -
16
Obstacle avoidance robot using sonar sensor (OARuS)
Published 2008“…The obstacle-avoidance method is a means to avoid obstacles that exist within the correction area of groping locomotion by applying a suitable algorithm to the humanoid robot’s control system. …”
Get full text
Learning Object -
17
Automated Vehicle Classification (AVC) using machine learning implementation in Malaysia's toll system
Published 2024“…YOLOv8 exhibits superior performance with the highest MAP of 0.995 after fine-tuning compared to other models, demonstrating effectiveness in real-time object detection. The system employs a single detection process, ensuring only one vehicle is detected at a time, enhancing accuracy. …”
Get full text
Get full text
Get full text
Book Chapter -
18
-
19
Vertical Fast Handoff Technique For Mobile IPv6 in Heterogeneous 4G Networks
Published 2009“…As for the first component, a link layer mechanism with the notion of a selection algorithm based on weighted mean is primarily introduced for collecting link layer information and discovering the candidate access router. …”
Get full text
Get full text
Thesis -
20
Development of a New Modeling Circuit for the Remote Terminal Unit (RTU) with GSM Communication
Published 2013“…This system involves the detection of fault connected to the microcontroller(PIC18F77A) and GSM modem. …”
Get full text
Get full text
Conference or Workshop Item
