Search Results - (( mobile evaluation between algorithm ) OR ( user identification based algorithm ))

Refine Results
  1. 1

    INVESTIGATION OF IMPROVED CHROMAMETRY MEASUREMENT ALGORITHM FOR PALM OIL FRESHNESS & SAFETY IDENTIFICATION USING MOBILE PHONE by ABDUL RAZAK, FARAH NABILLAH

    Published 2017
    “…The relationship between colour space and the chromametry algorithm measurement is the main criteria when determining the freshness of the food.…”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Automated data process in participatory sensing using QR-code and EAN-13 barcode by Che Ya, Mohamad Fakhrul Syafiq

    Published 2018
    “…The enhanced algorithm was evaluated using a developed prototype which is an Android mobile application of a crowdsourcing data submission based on product price and information, WE+Price, in which, the algorithm was embedded. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Convolutional neural network based mobile application for poisonous mushroom detection by Amirul, Shazlin Nizam, Mohd Sabri, Norlina, Gloria, Jennis Tan, Redwan, Nurul Ainina, Zhiping, Zhang

    Published 2025
    “…To address these issues, this study aims to develop a mushroom detection prototype specifically for identifying poisonous mushrooms using a mobile application. The application leverages a Convolutional Neural Network (CNN) algorithm to accurately classify mushrooms based on user-submitted images. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Effective predicate identification algorithm for XML retrieval by Roko, Abubakar, C. Doraisamy, Shyamala, Nakone, Bello

    Published 2018
    “…Finally, an effective predicate identification algorithm (EPIA) which uses EBQS and STPS to return relevant predicates is introduced. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias by Alias, Nur Farehah

    Published 2017
    “…Therefore, this project has proposed a method called token based alert notification. There are three algorithm developed for token based alert notification which is tokenization algorithm, token matching algorithm and item identification algorithm. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Eeg-Based Person Identification Using Multi-Levelwavelet Decomposition With Multi-Objective Flower Pollination Algorithm by Yahya Alyasseri, Zaid Abdi Alkareem

    Published 2020
    “…Recently, several studies showed that the brain electrical activity or electroencephalogram (EEG) signals provide unique features that can be considered as user identification techniques. But, it is a challenging task where there are three important things must be addressed carefully in any EEG-based person identification. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Effects of user selected conditions on modeling of dynamic systems using adaptive fuzzy model by Yaacob, Mohd. Shafiek, Jamaluddin, Hishamuddin

    Published 2001
    “…The implementation and the computational aspects of the training algorithm are also highlighted. Three examples of discrete-time nonlinear systems are used in the simulation study to show the effects of user selected conditions on the identification process. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Fault Detection and Identification in Quadrotor System (Quadrotor Robot) by Chan, Shi Jing, Pebrianti, Dwi

    Published 2016
    “…The aim of the research is to construct and design a Fault Detection and Isolation algorithm. This dynamic model is based on the first principles of the Quadrotor: Propeller model and its force as well as moments generation. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Performance comparison between genetic algorithm and ant colony optimization algorithm for mobile robot path planning in global static environment / Nohaidda Sariff by Sariff, Nohaidda

    Published 2011
    “…The main goal of this research is to compare the performances between Genetic Algorithm (GA) and Ant Colony Optimization (ACO) algorithm. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Tag clouds algorithm with the inclusion of personality traits by Ahmad Affandi, Supli

    Published 2015
    “…Therefore, the main objective of this study is to develop an algorithm that can adapt visual features of tag cloud layout styles based on personality traits of the user. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Effective query structuring with ranking using named entity categories for XML retrieval by Roko, Abubakar

    Published 2016
    “…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    A graphical user interface application for continuous-time identification of dynamical system by Rahmat, Mohd. Fua'ad, Omar, Rosli, Jamaluddin, Hishamuddin

    Published 2002
    “…This paper introduces a Graphical User Interface (GUI) application in system identification and parameter estimation of dynamic systems using Generalized Poisson Moment Functionals (GPMF) method based on Instrumental Variable (IV) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    A new Doppler Spread Estimation Algorithm Based on Zero Crossings of The Auto-correlation by Altag Ali, Gassan, Jeoti , Varun, Manzoor, Shahid

    Published 2010
    “…The Doppler spread, or evenly, the mobile speed of motion, is an evaluation of the spectral spreading of mobile fading channel. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    A coalition model for efficient indexing in wireless sensor network with random mobility / Hazem Jihad Ali Badarneh by Hazem Jihad , Ali Badarneh

    Published 2021
    “…The second evaluation divides into three scenarios. The first one evaluates Coalition-Based Index-Tree framework independently, without any effect from Dynamic-Coalition framework and Static-Coalition algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    An efficient fuzzy clustering algorithm for mining user session clusters on web log data by Mallik, M. A., Zulkurnain, Nurul Fariza

    Published 2021
    “…Because there are so many end-user sessions and URL resources, the size of web user session data is enormous. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Inter-system handoff management in mobile cellular networks / Syamil Khalid by Khalid, Syamil

    Published 2011
    “…A simulation model developed to study the performance of the relative signal strength with hysteresis and threshold (RSS-HT) algorithm between mobile and radio tower in cellular network. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Permission-based fault tolerant mutual exclusion algorithm for mobile Ad Hoc networks by Zarafshan, Faraneh

    Published 2015
    “…This method is then utilized as the basis of dynamic ancestral mutual exclusion algorithm for MANET which is named as MDA. This algorithm is presented and evaluated for different scenarios of mobility of nodes, failure, load and number of nodes. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Context identification of scientific papers via agent-based model for text mining (ABM-TM) by Mahmoud M.A., Ahmad M.S., Yusoff M.Z.M., Mustapha A.

    Published 2023
    “…In this paper, we propose an agent-based text mining algorithm to extract potential context of papers published in the WWW. …”
    Article