Search Results - (( mobile estimation search algorithm ) OR ( based information based algorithm ))
Search alternatives:
- mobile estimation »
- based information »
- information based »
- search »
-
1
Multi-sensor fusion based on multiple classifier systems for human activity identification
Published 2019“…To provide compact feature vector representation, we studied hybrid bio-inspired evolutionary search algorithm and correlation-based feature selection method and evaluate their impact on extracted feature vectors from individual sensor modality. …”
Get full text
Get full text
Article -
2
The classification of wink-based eeg signals by means of transfer learning models
Published 2021“…It was demonstrated from the simulation investigation that the CWT model could yield a better signal transformation amongst the preprocessing algorithms. In addition, amongst the eighteen TL models evaluated based on the CWT transformation, fourteen was f ound to be able to extract the features reasonable, i.e., VGG16, VGG19, ResNet101, ResNet101 V2, ResNet152, ResNet152 V2, Inception V3, Inception ResNet V2, Xception, MobileNetV2, DenseNet 121, DenseNet 169, NasNetMobile and NasNetLarge. …”
Get full text
Get full text
Thesis -
3
Scale-invariant and adaptive-search template matching for monocular visual odometry in low-textured environment
Published 2016“…The most important task for any autonomous mobile vehicle is the reliable estimation of its position over time. …”
Get full text
Get full text
Thesis -
4
Factors influencing graphical user algorithm for mobile banking user authentication: a systematic literature review
Published 2014“…With the increasing number of mobile users, which currently is estimated to be about 500million users by 2015 according to a study done by the Yankee Group in 2011, the main objective of this study is to review studies on mobile banking usability factors and graphical user authentication algorithms on the suitable algorithm to be adopted for mobile banking user authentication. …”
Get full text
Get full text
Get full text
Article -
5
Enhancement Of Aodv Routing Protocol In Masnets
Published 2015“…Nowadays, most of researchers working on Wireless Sensor Networks (WSNs) focus on Mobile Ad-hoc and Sensor Networks (MASNETs) due to their wide range of potential applications ranging from underwater monitoring to search and rescue mobile robotics applications. …”
Get full text
Get full text
Proceeding -
6
Enhanced PAPR reduction and channel estimation techniques in multi-carrier wireless communication system
Published 2016“…Furthermore, the local search channel estimation using number particles for each single swarm that had been used to identify the best fitness solution was computed from the average BER value. …”
Get full text
Get full text
Thesis -
7
Gas inspector mobile robot as carbon monoxide source finder
Published 2015“…In this project an inspector mobile robot is implemented to localize fire as a CO source,and a novel searching strategy including a sensing unit and a searching method is proposed. …”
Get full text
Get full text
Thesis -
8
Conflict Resolution Strategy In Handover Management For 4G And 5G Networks
Published 2024journal::journal article -
9
A review on the graphical user authentication algorithm : recognition-based and recall-based.
Published 2013“…User authentication has become an important consideration in information security as traditional password-based schemes are constantly subjected to attacks. …”
Get full text
Get full text
Article -
10
An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias
Published 2017“…Therefore, this project has proposed a method called token based alert notification. There are three algorithm developed for token based alert notification which is tokenization algorithm, token matching algorithm and item identification algorithm. …”
Get full text
Get full text
Thesis -
11
Agent-based extraction algorithm for computational problem solving
Published 2015“…The results show that the extraction algorithm has been able to extract 100 % of the information correctly. …”
Get full text
Get full text
Thesis -
12
MGR: An Information Theory Based Hierarchical Divisive Clustering Algorithm for Categorical Data
Published 2014“…This research proposes mean gain ratio (MGR), a new information theory based hierarchical divisive clustering algorithm for categorical data. …”
Get full text
Get full text
Get full text
Article -
13
Location based services of nearest petrol station using asymmetric key algorithm / Muhammad Awwab Mohd Amdan
Published 2014“…El-gamal encryption system is an asymmetric key encryption algorithm which is based on the Diffie-Hellman key exchange. …”
Get full text
Get full text
Thesis -
14
Adaptive intelligence job online scheduling within dynamic grid environment based on gridsim
Published 2008“…Additionally, the provided common information from Grid Information Service (GIS) and an arrival new job are calculated by Fuzzy C-Means (FCM) algorithm in order· to evaluate the current status of resources and groups of arrival jobs. …”
Get full text
Get full text
Article -
15
Training size optimization with reduced complexity in cell-free massive MIMO system
Published 2019“…In addition, we proposed and compared the performance of different training size optimization algorithms, namely exhaustive search optimization, bisection optimization and min–max optimization, with each method has different level of calculation complexities. …”
Get full text
Get full text
Article -
16
-
17
A new algorithm on Graphical User Authentication (GUA) based on multi-line grids
Published 2010“…Thereafter a comparative analysis of all Recall-Based algorithms based on attack patterns of graphical user authentication is tabulated. …”
Get full text
Get full text
Get full text
Article -
18
An adaptive density-based method for clustering evolving data streams / Amineh Amini
Published 2014“…This study proposes a density-based algorithm for clustering evolving data streams. …”
Get full text
Get full text
Get full text
Thesis -
19
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…The chaotic-based encryption algorithms have been improved a lot in terms of their robustness. …”
Get full text
Get full text
Get full text
Article -
20
Algorithms for extracting adjacency matrix based on Formal Concept Analysis (FCA)
Published 2017“…The desire to achieve a holistic representation of Information Retrieval (IR) with the aim for a human-oriented form of representation has spurred the growth of concept-based IR search techniques such as the Semantic Web technology. …”
Get full text
Get full text
Conference or Workshop Item
