Search Results - (( mobile evaluation between algorithm ) OR ( shape identification _ algorithm ))
Search alternatives:
- shape identification »
- evaluation between »
- mobile evaluation »
- between algorithm »
-
1
Performance evaluation of vertical handoff in fourth generation (4G) networks model
Published 2009Get full text
Working Paper -
2
Performance comparison between genetic algorithm and ant colony optimization algorithm for mobile robot path planning in global static environment / Nohaidda Sariff
Published 2011“…The main goal of this research is to compare the performances between Genetic Algorithm (GA) and Ant Colony Optimization (ACO) algorithm. …”
Get full text
Get full text
Thesis -
3
INVESTIGATION OF IMPROVED CHROMAMETRY MEASUREMENT ALGORITHM FOR PALM OIL FRESHNESS & SAFETY IDENTIFICATION USING MOBILE PHONE
Published 2017“…The relationship between colour space and the chromametry algorithm measurement is the main criteria when determining the freshness of the food.…”
Get full text
Get full text
Final Year Project -
4
A new Doppler Spread Estimation Algorithm Based on Zero Crossings of The Auto-correlation
Published 2010“…The Doppler spread, or evenly, the mobile speed of motion, is an evaluation of the spectral spreading of mobile fading channel. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A coalition model for efficient indexing in wireless sensor network with random mobility / Hazem Jihad Ali Badarneh
Published 2021“…The second evaluation divides into three scenarios. The first one evaluates Coalition-Based Index-Tree framework independently, without any effect from Dynamic-Coalition framework and Static-Coalition algorithm. …”
Get full text
Get full text
Get full text
Thesis -
6
Human identification at a distance using body shape information
Published 2013“…This paper presents an intelligent system approach for human identification at a distance using human body shape information. …”
Get full text
Get full text
Get full text
Article -
7
Plant identification using combination of fuzzy c-means spatial pyramid matching, gist, multi-texton histogram and multiview dictionary learning
Published 2016“…Most of the existing plant identification methods are based on both the global shape features and the intact plant leaves. …”
Get full text
Get full text
Thesis -
8
Inter-system handoff management in mobile cellular networks / Syamil Khalid
Published 2011“…A simulation model developed to study the performance of the relative signal strength with hysteresis and threshold (RSS-HT) algorithm between mobile and radio tower in cellular network. …”
Get full text
Get full text
Thesis -
9
Permission-based fault tolerant mutual exclusion algorithm for mobile Ad Hoc networks
Published 2015“…This method is then utilized as the basis of dynamic ancestral mutual exclusion algorithm for MANET which is named as MDA. This algorithm is presented and evaluated for different scenarios of mobility of nodes, failure, load and number of nodes. …”
Get full text
Get full text
Thesis -
10
Inter system handoff management in cellular mobile networks / Syamil Khalid
“…This paper presents a handoff technique which supports mobility between dissimilar networks. The boundary cell of cellular network system is designed by using MATLAB design software. …”
Get full text
Get full text
Article -
11
Security enhancement of route optimization in mobile IPv6 networks
Published 2008“…An enhanced security algorithm is developed on top of MIPv6 RO to secure data and prepare a safe communication between MN and CN. …”
Get full text
Get full text
Get full text
Article -
12
Mobile data gathering algorithms for wireless sensor networks
Published 2014“…This algorithm enables shortened tour length for the respective mobile element. …”
Get full text
Get full text
Thesis -
13
Performance evaluation of mobile ad hoc network in wireless LAN / Norfadhilah Hasan
Published 2005“…The work presented in this paper evaluates the performance of two MANET routing protocol known as Dynamic Source Routing (DSR) and Temporally Ordered Routing Algorithm (TORA). …”
Get full text
Get full text
Thesis -
14
Secure mobile AES encryptor (SMAE)
Published 2016“…The purpose of this project is to identify a way to develop a mobile web application for the encryption and decryption of files using the 256 –bit Advanced Encryption Standard (AES) encryption algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
15
Tag clouds algorithm with the inclusion of personality traits
Published 2015“…The algorithm was developed based on three theories of personality traits, namely Myers-Briggs Type Indicator (MBTI), Shape, and Multiple Intelligence (MI). …”
Get full text
Get full text
Get full text
Thesis -
16
Feature identification in a real surface metrology analysis by means of Double Iteration Sobel (DIS) / Ainaa Farhanah Mohd Razali
Published 2022“…The results of the verification of the system algorithm on the simulated 3D areal surface topography of a sloped bumps shows that the system algorithm can effectively identified the edges features and segmented them following the shape partem of the surface features of the sloped bumps. …”
Get full text
Get full text
Thesis -
17
The Effect Of Linkages In The Hierarchical Clustering Of Auto-Regressive Algorithm For Defect Identification In Heat Exchanger Tubes
Published 2019“…The AR algorithm characterizes the shape of the stress wave signals by AR coefficients and clustered using ‘centroid’ linkages. …”
Get full text
Get full text
Get full text
Article -
18
Enhanced Ad Hoc On-Demand Distance Vector Routing Protocol For Mobile Ad Hoc Network Internet Connectivity
Published 2006“…There are several ad hoc routing protocols, such as AODV, DSR, and DSDV that propose solutions for routing within a mobile ad hoc network. However, since there is an interest in communication between not only mobile devices in an ad hoc network, but also between a mobile device in an ad hoc network and a fixed device in a fixed network (e.g. the Internet), the ad hoc routing protocols need to be modified. …”
Get full text
Get full text
Thesis -
19
-
20
Route optimization security in mobile IPv6 wireless networks: a test-bed experience
Published 2008“…Route Optimization (RO) is standard in Mobile IPv6 (MIPv6) to route packets between Mobile Node (MN) and Correspondent Node (CN) using shortest possible path. …”
Get full text
Get full text
Conference or Workshop Item
