Search Results - (( mobile evaluation ((a algorithm) OR (bat algorithm)) ) OR ( _ identification using algorithm ))
Search alternatives:
- identification using »
- mobile evaluation »
- _ identification »
- using algorithm »
- bat algorithm »
- a algorithm »
-
1
-
2
-
3
-
4
INVESTIGATION OF IMPROVED CHROMAMETRY MEASUREMENT ALGORITHM FOR PALM OIL FRESHNESS & SAFETY IDENTIFICATION USING MOBILE PHONE
Published 2017“…The l*a*b colour space also being compared with the RGB colour space to evaluate which colour space gave a linear result to calculate the error calculation. …”
Get full text
Get full text
Final Year Project -
5
A comprehensive overview of classical and modern route planning algorithms for self-driving mobile robots
Published 2022“…Classical or traditional methods, such as Roadmaps (Visibility Graph and Voronoi Diagram), Potential Fields, and Cell Decomposition, and modern methodologies such as heuristic-based (Dijkstra Method, A* Algorithms, and D* Algorithms), metaheuristics algorithms (such as PSO, Bat Algorithm, ACO, and Genetic Algorithm), and neural systems such as fuzzy neural networks or fuzzy logic (FL) and Artificial Neural Networks (ANN) are described in this report. …”
Get full text
Get full text
Get full text
Article -
6
Delay and energy-aware routing for efficient data collection in wireless sensor networks / Ihsan Ali
Published 2024“…Both Bat Algorithm parameters and AFW parameters are adaptively tuned to balance exploration and exploitation throughout the optimization process. …”
Get full text
Get full text
Get full text
Thesis -
7
Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff
Published 2017“…Basically, the QEEA is based on the Time Domain (TD) and Frequency Domain (FD) scheduling where it is dependent on the QoS requirements to allocate resources. The proposed algorithm is compared against other scheduling algorithms, namely, the Channel and QoS Aware (CQA), Priority Set Scheduler (PSS), Proportional Fair (PF), Maximum Throughput (MT) and Blind Average Throughput (BAT). …”
Get full text
Get full text
Thesis -
8
Automated data process in participatory sensing using QR-code and EAN-13 barcode
Published 2018“…The QR code was used as a mechanism to activating the function for mobile application and determining the location, while EAN-13 barcode was used as a product identification. …”
Get full text
Get full text
Thesis -
9
Bat optimized link state routing protocol for energy-aware mobile ad-hoc networks
Published 2023“…Mobile ad hoc network (MANET) can be described as a group of wireless mobile nodes that form a temporary dynamic and independent infrastructure network or a central administration facility. …”
Article -
10
An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias
Published 2017“…Android smartphone is used in order to test this algorithm.…”
Get full text
Get full text
Thesis -
11
Multi-sensor fusion based on multiple classifier systems for human activity identification
Published 2019“…To this end, computationally efficient classification algorithms such as decision tree, logistic regression and k-Nearest Neighbors were used to implement diverse, flexible and dynamic human activity detection systems. …”
Get full text
Get full text
Article -
12
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…It involves development of Max-Min Rule-Based Classification Algorithm. The fourth stage is to design evaluation methodology of Max-Min Rule-Based Classification Algorithm using classifier model. …”
Get full text
Get full text
Thesis -
13
Convolutional neural network based mobile application for poisonous mushroom detection
Published 2025“…To address these issues, this study aims to develop a mushroom detection prototype specifically for identifying poisonous mushrooms using a mobile application. …”
Get full text
Get full text
Get full text
Article -
14
Analytical method for forensic investigation of social networking applications on smartphones
Published 2016“…The identified patterns are then used to design an algorithm for detecting social networking data remnants automatically. …”
Get full text
Get full text
Get full text
Thesis -
15
Malaysian license plate recognition system using Convolutional Neural Network (CNN) on web application / Nur Farahana Mahmud
Published 2022“…Nowadays, there are numerous license plate recognition systems that have been developed and analysed effectively by previous researchers using different machine learning algorithms. However, according to a recent study, ANN algorithms require a huge amount of training data while BPFFNN algorithms only have an average success rate of 70% in recognizing all the characters. …”
Get full text
Get full text
Student Project -
16
Human activity and posture classification using smartphone sensors and Matlab mobile
Published 2022“…Activity recognition has been used in various ways as technology has advanced, particularly using a smartphone-based approach. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
17
Performance evaluation of marker recognition algorithm for mobile augmented reality in the real environment
Published 2023“…BRISK detector, FREAK descriptor, and Hamming distance matcher algorithms are implemented in a mobile AR application in order to evaluate the AR algorithm. …”
Get full text
Get full text
Get full text
Article -
18
A Mobile Application For Stock Price Prediction
Published 2021“…In conclusion, this project’s objectives were achieved by developing the mobile application for stock price prediction using the best time series algorithm evaluated, which is ARIMA.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
A comparative study on ant-colony algorithm and genetic algorithm for mobile robot planning.
Published 2024“…Focusing on routing optimization, the study evaluates Ant-Colony Optimization (ACO) and Genetic Algorithm (GA) in Mobile Robot Planning. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
An Effectual Secured Approach Against Sybil Attacks In Wireless Networks
Published 2024journal::journal article
