Search Results - (( mobile evaluation _ algorithm ) OR ( user identification using algorithm ))

Refine Results
  1. 1

    INVESTIGATION OF IMPROVED CHROMAMETRY MEASUREMENT ALGORITHM FOR PALM OIL FRESHNESS & SAFETY IDENTIFICATION USING MOBILE PHONE by ABDUL RAZAK, FARAH NABILLAH

    Published 2017
    “…The b parameter which is the sensitivity of the mobile phone was also been investigated to reduce the colour error calculation. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3

    Automated data process in participatory sensing using QR-code and EAN-13 barcode by Che Ya, Mohamad Fakhrul Syafiq

    Published 2018
    “…The enhanced algorithm was evaluated using a developed prototype which is an Android mobile application of a crowdsourcing data submission based on product price and information, WE+Price, in which, the algorithm was embedded. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Convolutional neural network based mobile application for poisonous mushroom detection by Amirul, Shazlin Nizam, Mohd Sabri, Norlina, Gloria, Jennis Tan, Redwan, Nurul Ainina, Zhiping, Zhang

    Published 2025
    “…To address these issues, this study aims to develop a mushroom detection prototype specifically for identifying poisonous mushrooms using a mobile application. The application leverages a Convolutional Neural Network (CNN) algorithm to accurately classify mushrooms based on user-submitted images. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Analytical method for forensic investigation of social networking applications on smartphones by Dezfouli, Farhood Norouzizadeh

    Published 2016
    “…The identified patterns are then used to design an algorithm for detecting social networking data remnants automatically. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Effective predicate identification algorithm for XML retrieval by Roko, Abubakar, C. Doraisamy, Shyamala, Nakone, Bello

    Published 2018
    “…Finally, an effective predicate identification algorithm (EPIA) which uses EBQS and STPS to return relevant predicates is introduced. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Effective query structuring with ranking using named entity categories for XML retrieval by Roko, Abubakar

    Published 2016
    “…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Eeg-Based Person Identification Using Multi-Levelwavelet Decomposition With Multi-Objective Flower Pollination Algorithm by Yahya Alyasseri, Zaid Abdi Alkareem

    Published 2020
    “…For addressing these points, a novel person identification method that is using EEG with multi-level wavelet decomposition and multi-objective flower pollination algorithm is proposed in this thesis. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Effects of user selected conditions on modeling of dynamic systems using adaptive fuzzy model by Yaacob, Mohd. Shafiek, Jamaluddin, Hishamuddin

    Published 2001
    “…The implementation and the computational aspects of the training algorithm are also highlighted. Three examples of discrete-time nonlinear systems are used in the simulation study to show the effects of user selected conditions on the identification process. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Performance evaluation of marker recognition algorithm for mobile augmented reality in the real environment by Siok, Yee Tan, Haslina Arshad

    Published 2023
    “…BRISK detector, FREAK descriptor, and Hamming distance matcher algorithms are implemented in a mobile AR application in order to evaluate the AR algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    A Mobile Application For Stock Price Prediction by Choy, Yi Tou

    Published 2021
    “…In conclusion, this project’s objectives were achieved by developing the mobile application for stock price prediction using the best time series algorithm evaluated, which is ARIMA.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13

    Smart cards and the fingerprint: a framework for user identification and authentication by Omar, M. H., Din, Roshidi, Tahir, H. M.

    Published 2003
    “…As a result, the research proposed a framework for user identification and authentication in automatic-teller-machine (ATM) systems using fingerprints and smart cards as opposed to the PIN and magnetic-stripe cards.…”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Tag clouds algorithm with the inclusion of personality traits by Ahmad Affandi, Supli

    Published 2015
    “…This algorithm is beneficial for decision making using information visualization in which personality traits of the user are heavily inclined. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    A comparative study on ant-colony algorithm and genetic algorithm for mobile robot planning. by Rajendran, Piraviendran, Othman, Muhaini

    Published 2024
    “…Focusing on routing optimization, the study evaluates Ant-Colony Optimization (ACO) and Genetic Algorithm (GA) in Mobile Robot Planning. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Identifying the influential spreaders in multilayer interactions of online social networks by Al-Garadi, M.A., Varathan, Kasturi Dewi, Ravana, S.D., Ahmed, E., Chang, V.

    Published 2016
    “…The measurement results are found to be more reliable when the identification algorithms are applied to proposed topological representation compared when these algorithms are applied to single layer representations.…”
    Get full text
    Get full text
    Article
  17. 17

    Online fingerprint recognition by Khairul Bariyah, Abd Rahim

    Published 2010
    “…Fingerprints are the most popularly used in biometric identification and recognition systems, because they can be easily used and their features are highly reliable. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  18. 18

    Fault Detection and Identification in Quadrotor System (Quadrotor Robot) by Chan, Shi Jing, Pebrianti, Dwi

    Published 2016
    “…This Artificial Neural Network (ANN) is an algorithm that is used to determine the type of fault and the severity level as well as isolate the fault from the system. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    DEVELOPMENT OF IRIS RECOGNITION SYSTEM by Mohd Kamarudin, Nur Eliza

    Published 2016
    “…This project implements an iris recognition algorithm as a biometric identification. There is a need for reliable and security identification since typical identification methods using identity cards, passwords, and user name possess threats to the security of an organization because of human error. …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    An efficient fuzzy clustering algorithm for mining user session clusters on web log data by Mallik, M. A., Zulkurnain, Nurul Fariza

    Published 2021
    “…Client access patterns can be mined from web access log information using Web Usage Mining (WUM) techniques. Because there are so many end-user sessions and URL resources, the size of web user session data is enormous. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article