Search Results - (( mobile evaluation index algorithm ) OR ( writer identification using algorithm ))*
Search alternatives:
- identification using »
- mobile evaluation »
- evaluation index »
- index algorithm »
- using algorithm »
-
1
Improved random forest for feature selection in writer identification
Published 2015“…Writer Identification (WI) is a process to determine the writer of a given handwriting sample. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
A New Swarm-Based Framework for Handwritten Authorship Identification in Forensic Document Analysis
Published 2014“…However in this chapter, feature selection is used to obtain the unique individual significant features which are proven very important in handwriting analysis of Writer Identification domain. …”
Get full text
Get full text
Book Chapter -
3
A new swarm-based framework for handwritten authorship identification in forensic document analysis
Published 2014“…The use of feature selection as one of the important machine learning task is often disregarded in Writer Identification domain, with only a handful of studies implemented feature selection phase. …”
Get full text
Get full text
Book Chapter -
4
Discretization of integrated moment invariants for writer identification
Published 2008“…Hence, in this study, an integrated scaling formulation of Aspect Scaling Invariant is presented in Writer Identification to hunt for the individuality perseverance. …”
Get full text
Get full text
Conference or Workshop Item -
5
A coalition model for efficient indexing in wireless sensor network with random mobility / Hazem Jihad Ali Badarneh
Published 2021“…The second evaluation divides into three scenarios. The first one evaluates Coalition-Based Index-Tree framework independently, without any effect from Dynamic-Coalition framework and Static-Coalition algorithm. …”
Get full text
Get full text
Get full text
Thesis -
6
Invariants discretization for individuality representation in handwritten authorship
Published 2008“…Writer identification is one of the areas in pattern recognition that have created a center of attention by many researchers to work in. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Optimizing the performance of mobile malware detection using the indexing rule
Published 2024journal::journal article -
8
A comprehensive review of mobile botnet detection using genetic algorithm: A systematic review
Published 2024journal::journal article -
9
Performance evaluation of LTE scheduling techniques for heterogeneous traffic and different mobility scenarios
Published 2015“…In this paper five scheduling algorithms were investigated and their performance was evaluated in terms of Fairness Index, Peak Throughput, Average Throughput and Edge Cell User Throughput. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
10
Performance evaluation of LTE scheduling techniques for heterogeneous traffic and different mobility scenarios
Published 2014“…In this paper five scheduling algorithms were investigated and their performance was evaluated in terms of Fairness Index, Peak Throughput, Average Throughput and Edge Cell User Throughput. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
Systematic analysis on mobile botnet detection techniques using genetic algorithm
Published 2024Conference Paper -
12
-
13
-
14
-
15
-
16
-
17
-
18
Modeling and Analysis of New Hybrid Clustering Technique for Vehicular Ad Hoc Network
Published 2023“…Four evaluation indexes, namely, the root mean square error (RMSE), silhouette coefficient (SC), Davies�Bouldin (DB) index, and Dunn index (DI), were used directly to test and evaluate the results of the clustering. …”
Article -
19
-
20
A new mobile malware classification for call log exploitation
Published 2024journal::journal article
