Search Results - (( mobile evaluation case algorithm ) OR ( user identification based algorithm ))*

Refine Results
  1. 1

    A comparative study on ant-colony algorithm and genetic algorithm for mobile robot planning. by Rajendran, Piraviendran, Othman, Muhaini

    Published 2024
    “…Focusing on routing optimization, the study evaluates Ant-Colony Optimization (ACO) and Genetic Algorithm (GA) in Mobile Robot Planning. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2
  3. 3

    Effective predicate identification algorithm for XML retrieval by Roko, Abubakar, C. Doraisamy, Shyamala, Nakone, Bello

    Published 2018
    “…Finally, an effective predicate identification algorithm (EPIA) which uses EBQS and STPS to return relevant predicates is introduced. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias by Alias, Nur Farehah

    Published 2017
    “…Therefore, this project has proposed a method called token based alert notification. There are three algorithm developed for token based alert notification which is tokenization algorithm, token matching algorithm and item identification algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Eeg-Based Person Identification Using Multi-Levelwavelet Decomposition With Multi-Objective Flower Pollination Algorithm by Yahya Alyasseri, Zaid Abdi Alkareem

    Published 2020
    “…Recently, several studies showed that the brain electrical activity or electroencephalogram (EEG) signals provide unique features that can be considered as user identification techniques. But, it is a challenging task where there are three important things must be addressed carefully in any EEG-based person identification. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Systematic Analysis on Mobile Botnet Detection Techniques Using Genetic Algorithm by Rahman, MZA, Madihah Mohd Saudi

    Published 2024
    “…A case study was carried out to reverse engineering the mobile botnet codes. …”
    Proceedings Paper
  7. 7

    A coalition model for efficient indexing in wireless sensor network with random mobility / Hazem Jihad Ali Badarneh by Hazem Jihad , Ali Badarneh

    Published 2021
    “…The second evaluation divides into three scenarios. The first one evaluates Coalition-Based Index-Tree framework independently, without any effect from Dynamic-Coalition framework and Static-Coalition algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Effects of user selected conditions on modeling of dynamic systems using adaptive fuzzy model by Yaacob, Mohd. Shafiek, Jamaluddin, Hishamuddin

    Published 2001
    “…The implementation and the computational aspects of the training algorithm are also highlighted. Three examples of discrete-time nonlinear systems are used in the simulation study to show the effects of user selected conditions on the identification process. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Fault Detection and Identification in Quadrotor System (Quadrotor Robot) by Chan, Shi Jing, Pebrianti, Dwi

    Published 2016
    “…The aim of the research is to construct and design a Fault Detection and Isolation algorithm. This dynamic model is based on the first principles of the Quadrotor: Propeller model and its force as well as moments generation. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Permission-based fault tolerant mutual exclusion algorithm for mobile Ad Hoc networks by Zarafshan, Faraneh

    Published 2015
    “…This method is then utilized as the basis of dynamic ancestral mutual exclusion algorithm for MANET which is named as MDA. This algorithm is presented and evaluated for different scenarios of mobility of nodes, failure, load and number of nodes. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Tag clouds algorithm with the inclusion of personality traits by Ahmad Affandi, Supli

    Published 2015
    “…Therefore, the main objective of this study is to develop an algorithm that can adapt visual features of tag cloud layout styles based on personality traits of the user. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Effective query structuring with ranking using named entity categories for XML retrieval by Roko, Abubakar

    Published 2016
    “…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    A graphical user interface application for continuous-time identification of dynamical system by Rahmat, Mohd. Fua'ad, Omar, Rosli, Jamaluddin, Hishamuddin

    Published 2002
    “…This paper introduces a Graphical User Interface (GUI) application in system identification and parameter estimation of dynamic systems using Generalized Poisson Moment Functionals (GPMF) method based on Instrumental Variable (IV) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Performance comparison between genetic algorithm and ant colony optimization algorithm for mobile robot path planning in global static environment / Nohaidda Sariff by Sariff, Nohaidda

    Published 2011
    “…Subsequently, both algorithms were applied to the test environments. Finally, the performances of both algorithms were analyzed and evaluated based on the required criteria. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    An efficient fuzzy clustering algorithm for mining user session clusters on web log data by Mallik, M. A., Zulkurnain, Nurul Fariza

    Published 2021
    “…Because there are so many end-user sessions and URL resources, the size of web user session data is enormous. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Context identification of scientific papers via agent-based model for text mining (ABM-TM) by Mahmoud M.A., Ahmad M.S., Yusoff M.Z.M., Mustapha A.

    Published 2023
    “…In this paper, we propose an agent-based text mining algorithm to extract potential context of papers published in the WWW. …”
    Article
  18. 18

    Age detection from face using Convolutional Neural Network (CNN) / Hanin Hanisah Usok @ Yusoff by Usok @ Yusoff, Hanin Hanisah

    Published 2024
    “…The capacity to reliably estimate a person's age using facial traits is critical in improving user experiences and security processes. In this project, we want to create an age identification system that uses Convolutional Neural Network (CNN) algorithms to estimate people's ages fast and accurately from facial images. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20