Search Results - (( mobile evaluation from algorithm ) OR ( level classification system algorithm ))*

Refine Results
  1. 1
  2. 2
  3. 3

    Auto-formation group chat for fitness application with rule-based / Amar Aslam Ramli by Ramli, Amar Aslam

    Published 2018
    “…Moreover, the algorithm used for rule-based expert system is forward chaining method. …”
    Get full text
    Get full text
    Student Project
  4. 4

    Multi-sensor fusion based on multiple classifier systems for human activity identification by Nweke, Henry Friday, Teh, Ying Wah, Mujtaba, Ghulam, Alo, Uzoma Rita, Al-garadi, Mohammed Ali

    Published 2019
    “…To this end, computationally efficient classification algorithms such as decision tree, logistic regression and k-Nearest Neighbors were used to implement diverse, flexible and dynamic human activity detection systems. …”
    Get full text
    Get full text
    Article
  5. 5

    An intra-severity classification and adaptation technique to improve dysarthric speech recognition accuracy / Bassam Ali Qasem Al-Qatab by Bassam Ali Qasem, Al-Qatab

    Published 2020
    “…Firstly, intra-severity classification intended to identify the level of severity of the dysarthric speakers. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Performance evaluation of marker recognition algorithm for mobile augmented reality in the real environment by Siok, Yee Tan, Haslina Arshad

    Published 2023
    “…The robustness of the AR algorithm in terms of scale invariance was evaluated from the distance of 5cm up to 50cm from the input image. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Jogging activity recognition using k-NN algorithm by Afifah Ismail

    Published 2022
    “…Jogging activity recognition using the k-NN algorithm is a system that can help users collect information data of user speed movement using speed sensor and give the classification of jogging activity to the user. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  8. 8

    A Real time specific weed discrimination system using multi-Level wavelet decomposition by Siddiqi, M.H., Sulaiman, S., Faye, Ibrahima, Ahmad, I.

    Published 2009
    “…The developed algorithm was used for the real time specific weed discrimination employing multi-level wavelet decomposition. …”
    Get full text
    Get full text
    Citation Index Journal
  9. 9

    A Real time specific weed discrimination system using multi-Level wavelet decomposition by Siddiqi, M.H., Sulaiman, S., Faye, Ibrahima, Ahmad, I.

    Published 2009
    “…The developed algorithm was used for the real time specific weed discrimination employing multi-level wavelet decomposition. …”
    Get full text
    Get full text
    Citation Index Journal
  10. 10
  11. 11

    Neural network diagnostic system for dengue patients risk classification by Faisal, T., Taib, M.N., Ibrahim, Fatimah

    Published 2012
    “…However, it has been a great challenge for the physicians to identify the level of risk in dengue patients due to overlapping of the medical classification criteria. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    A new hybrid technique for nosologic segmentation of primary brain tumors / Shafaf Ibrahim by Ibrahim, Shafaf

    Published 2015
    “…For this purpose, an algorithm which hybridized the Intensity Based Analysis (IBA), Grey Level Co-occurrence Matrices (GLCM), Adaptive Network-based Fuzzy Inference System (ANFIS) and £article ~warm Optimization (PSO) Clustering Algorithm (CAPSOCA) is proposed. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Classification System for Wood Recognition using K-Nearest Neighbor with Optimized Features from Binary Gravitational Algorithm by Taman, Ishak, Md Rosid, Nur Atika, Karis, Mohd Safirin, Hasim, Saipol Hadi, Zainal Abidin, Amar Faiz, Nordin, Nur Anis, Omar, Norhaizat, Jaafar, Hazriq Izzuan, Ab Ghani, Zailani, Hassan, Jefery

    Published 2014
    “…The project proposes a classification system using Gray Level Co-Occurrence Matrix (GLCM) as feature extractor, K-Nearest Neighbor (K-NN) as classifier and Binary Gravitational Search Algorithm (BGSA) as the optimizer for GLCM’s feature selection and parameters. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Performance evaluation of direction of arrival (DOA) for linear array antenna design using multiple signal classification (MUSIC) algorithm in variation of displacement vectors and... by Hamzah, Norhayati

    Published 2007
    “…In simple terms, these array antennas can reduce the co channel interference and effectively utilize the bandwidth by steering a high gain in the direction of interest and low gains in the undesired directions. In Smart Antenna system, the intelligence of the system depends on the information collected, processed and implemented through an algorithm i.e. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Hybrid indoor positioning utilizing multipath- assisted fingerprint and geometric estimation for single base station systems by Manap, Zahariah

    Published 2025
    “…The key attributes that establish the classification learning sessions are the channel parameters extracted from the ray tracing generated multipath signals. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19

    Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim by Masmuhallim, Anis Athirah

    Published 2024
    “…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
    Get full text
    Get full text
    Thesis
  20. 20

    File integrity monitor scheduling based on file security level classification by Abdullah, Zul Hilmi, Udzir, Nur Izura, Mahmod, Ramlan, Samsudin, Khairulmizam

    Published 2011
    “…Integrity of operating system components must be carefully handled in order to optimize the system security. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item