Search Results - (( mobile evaluation between algorithm ) OR ( shape identification using algorithmic ))*
Search alternatives:
- shape identification »
- identification using »
- evaluation between »
- mobile evaluation »
- between algorithm »
- algorithmic »
-
1
Human identification at a distance using body shape information
Published 2013“…This paper presents an intelligent system approach for human identification at a distance using human body shape information. …”
Get full text
Get full text
Get full text
Article -
2
Performance evaluation of vertical handoff in fourth generation (4G) networks model
Published 2009Get full text
Working Paper -
3
Plant identification using combination of fuzzy c-means spatial pyramid matching, gist, multi-texton histogram and multiview dictionary learning
Published 2016“…Most of the existing plant identification methods are based on both the global shape features and the intact plant leaves. …”
Get full text
Get full text
Thesis -
4
Performance comparison between genetic algorithm and ant colony optimization algorithm for mobile robot path planning in global static environment / Nohaidda Sariff
Published 2011“…The main goal of this research is to compare the performances between Genetic Algorithm (GA) and Ant Colony Optimization (ACO) algorithm. …”
Get full text
Get full text
Thesis -
5
INVESTIGATION OF IMPROVED CHROMAMETRY MEASUREMENT ALGORITHM FOR PALM OIL FRESHNESS & SAFETY IDENTIFICATION USING MOBILE PHONE
Published 2017“…The relationship between colour space and the chromametry algorithm measurement is the main criteria when determining the freshness of the food.…”
Get full text
Get full text
Final Year Project -
6
Tag clouds algorithm with the inclusion of personality traits
Published 2015“…This study focuses on two visual features associated with personality traits, which are colors and shapes. To achieve the aim of this study, Design Science methodology was used through three main phases: problem identification, design of solution, and evaluation. …”
Get full text
Get full text
Get full text
Thesis -
7
A new Doppler Spread Estimation Algorithm Based on Zero Crossings of The Auto-correlation
Published 2010“…The Doppler spread, or evenly, the mobile speed of motion, is an evaluation of the spectral spreading of mobile fading channel. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
A coalition model for efficient indexing in wireless sensor network with random mobility / Hazem Jihad Ali Badarneh
Published 2021“…The second evaluation divides into three scenarios. The first one evaluates Coalition-Based Index-Tree framework independently, without any effect from Dynamic-Coalition framework and Static-Coalition algorithm. …”
Get full text
Get full text
Get full text
Thesis -
9
Feature identification in a real surface metrology analysis by means of Double Iteration Sobel (DIS) / Ainaa Farhanah Mohd Razali
Published 2022“…The system algorithm is verified and validates on two sloped bumps surface topographies that have been simulated using MATLAB software and measured using the Alicona Infinite Focus Measurement (IFM) device, respectively. …”
Get full text
Get full text
Thesis -
10
The Effect Of Linkages In The Hierarchical Clustering Of Auto-Regressive Algorithm For Defect Identification In Heat Exchanger Tubes
Published 2019“…The AR algorithm characterizes the shape of the stress wave signals by AR coefficients and clustered using ‘centroid’ linkages. …”
Get full text
Get full text
Get full text
Article -
11
Inter-system handoff management in mobile cellular networks / Syamil Khalid
Published 2011“…A simulation model developed to study the performance of the relative signal strength with hysteresis and threshold (RSS-HT) algorithm between mobile and radio tower in cellular network. …”
Get full text
Get full text
Thesis -
12
Permission-based fault tolerant mutual exclusion algorithm for mobile Ad Hoc networks
Published 2015“…This method is then utilized as the basis of dynamic ancestral mutual exclusion algorithm for MANET which is named as MDA. This algorithm is presented and evaluated for different scenarios of mobility of nodes, failure, load and number of nodes. …”
Get full text
Get full text
Thesis -
13
-
14
Inter system handoff management in cellular mobile networks / Syamil Khalid
“…This paper presents a handoff technique which supports mobility between dissimilar networks. The boundary cell of cellular network system is designed by using MATLAB design software. …”
Get full text
Get full text
Article -
15
Identification of material properties of composite plates using Fourier-generated frequency response functions
Published 2019“…The present research adopts the use of Fourier-based plate model to synthesize FRFs for its proven prominent accuracy and incorporates with a hybrid optimization algorithm. …”
Get full text
Get full text
Article -
16
Security enhancement of route optimization in mobile IPv6 networks
Published 2008“…An enhanced security algorithm is developed on top of MIPv6 RO to secure data and prepare a safe communication between MN and CN. …”
Get full text
Get full text
Get full text
Article -
17
Mobile data gathering algorithms for wireless sensor networks
Published 2014“…This algorithm enables shortened tour length for the respective mobile element. …”
Get full text
Get full text
Thesis -
18
Flow regime identification of particles conveying in pneumatic pipeline using electric charge tomography and neural network techniques
Published 2006“…A high speed data acquisition card DAS1800HC is used to interface the sensors to a personal computer which processes the data using linear back projection algorithm (LBPA) and filtered back projection algorithm (FBPA). …”
Get full text
Get full text
Thesis -
19
Performance evaluation of mobile ad hoc network in wireless LAN / Norfadhilah Hasan
Published 2005“…The work presented in this paper evaluates the performance of two MANET routing protocol known as Dynamic Source Routing (DSR) and Temporally Ordered Routing Algorithm (TORA). …”
Get full text
Get full text
Thesis -
20
Secure mobile AES encryptor (SMAE)
Published 2016“…The purpose of this project is to identify a way to develop a mobile web application for the encryption and decryption of files using the 256 –bit Advanced Encryption Standard (AES) encryption algorithm. …”
Get full text
Get full text
Undergraduates Project Papers
