Search Results - (( mobile evaluation based algorithm ) OR ( shape identification using algorithm ))*
Search alternatives:
- shape identification »
- identification using »
- mobile evaluation »
- evaluation based »
- using algorithm »
-
1
Content-based indexing of low resolution documents
Published 2016“…The proposed identification and indexing method in the thesis uses a Visual Signature (VS). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
A coalition model for efficient indexing in wireless sensor network with random mobility / Hazem Jihad Ali Badarneh
Published 2021“…The second evaluation divides into three scenarios. The first one evaluates Coalition-Based Index-Tree framework independently, without any effect from Dynamic-Coalition framework and Static-Coalition algorithm. …”
Get full text
Get full text
Get full text
Thesis -
3
A comparative study on ant-colony algorithm and genetic algorithm for mobile robot planning.
Published 2024“…Focusing on routing optimization, the study evaluates Ant-Colony Optimization (ACO) and Genetic Algorithm (GA) in Mobile Robot Planning. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Human identification at a distance using body shape information
Published 2013“…This paper presents an intelligent system approach for human identification at a distance using human body shape information. …”
Get full text
Get full text
Get full text
Article -
5
-
6
Plant identification using combination of fuzzy c-means spatial pyramid matching, gist, multi-texton histogram and multiview dictionary learning
Published 2016“…Most of the existing plant identification methods are based on both the global shape features and the intact plant leaves. …”
Get full text
Get full text
Thesis -
7
Optimized routing algorithm for mobile multicast source in Wireless Mesh Networks
Published 2015“…Thus this paper proposes a Differential Evolution based optimized mobile multicast routing algorithm for the shared tree architecture. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim
Published 2024“…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
Get full text
Get full text
Thesis -
9
Permission-based fault tolerant mutual exclusion algorithm for mobile Ad Hoc networks
Published 2015“…Algorithms for mutual exclusion in DS are categorized into two main classes including token-based and permission-based algorithms. …”
Get full text
Get full text
Thesis -
10
A new Doppler Spread Estimation Algorithm Based on Zero Crossings of The Auto-correlation
Published 2010Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Performance evaluation of vertical handoff in fourth generation (4G) networks model
Published 2009Get full text
Working Paper -
12
Mobile data gathering algorithms for wireless sensor networks
Published 2014“…In this research, a Mobile Data Gathering based Network Layout (MDG-NL) algorithm is proposed. …”
Get full text
Get full text
Thesis -
13
Tag clouds algorithm with the inclusion of personality traits
Published 2015“…This study focuses on two visual features associated with personality traits, which are colors and shapes. To achieve the aim of this study, Design Science methodology was used through three main phases: problem identification, design of solution, and evaluation. …”
Get full text
Get full text
Get full text
Thesis -
14
Systematic Analysis on Mobile Botnet Detection Techniques Using Genetic Algorithm
Published 2024“…A case study was carried out to reverse engineering the mobile botnet codes. Based on the findings, this mobile botnet has successfully posed itself as a fake anti-virus and has the capability to steal important data such as username and password from the Android-based devices. …”
Proceedings Paper -
15
Context-Aware Recommender System based on machine learning in tourist mobile application / Nor Liza Saad … [et al.]
Published 2022“…Furthermore, data were collected simulated based on the mobile application prototype to be used for finding the suitable machine learning algorithms in the recommendation system module. …”
Get full text
Get full text
Get full text
Article -
16
Feature identification in a real surface metrology analysis by means of Double Iteration Sobel (DIS) / Ainaa Farhanah Mohd Razali
Published 2022“…The system algorithm is verified and validates on two sloped bumps surface topographies that have been simulated using MATLAB software and measured using the Alicona Infinite Focus Measurement (IFM) device, respectively. …”
Get full text
Get full text
Thesis -
17
Cloudlet deployment and task offloading in mobile edge computing using variable-length whale and differential evolution optimization and analytical hierarchical process for decisio...
Published 2023“…Comparing this developed algorithm with other algorithms shows its superiority in multi-objective optimization (MOO) evaluation metrics. …”
Get full text
Get full text
Thesis -
18
-
19
Systematic analysis on mobile botnet detection techniques using genetic algorithm
Published 2024Conference Paper -
20
The Effect Of Linkages In The Hierarchical Clustering Of Auto-Regressive Algorithm For Defect Identification In Heat Exchanger Tubes
Published 2019“…The AR algorithm characterizes the shape of the stress wave signals by AR coefficients and clustered using ‘centroid’ linkages. …”
Get full text
Get full text
Get full text
Article
