Search Results - (( mobile evaluation method algorithm ) OR ( its applications based algorithm ))*

Refine Results
  1. 1

    Neighbour-based on-demand routing algorithms for mobile ad hoc networks by Ejmaa, Ali Mohamed E.

    Published 2017
    “…In addition, with regard to the second algorithm SNBR, the results show that SNBR overcomes the NCPR algorithm terms of normalize routing overhead by 58.80% as its due to its dropping factor. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Home buyer assistant using artificial bee colony algorithm / Muhammad Izzat Azri Azman by Azman, Muhammad Izzat Azri

    Published 2017
    “…After that, in exploitation process, the algorithms will exploit the generated population to search for a desired home according to the preferences and its priority. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Computing non-contactable drowsiness monitoring system with mobile machine vision by Alixson Polumpung, Lorita Angeline, Helen Sin Ee Chuo, Tan, Min Keng, Lim, Kit Guan, Teo, Kenneth Tze Kin

    Published 2022
    “…This project proposes a human facial features detection based on color segmentation via skin color and Viola- Jones algorithm for real time application. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7

    DurianCare: optimising trunk disease detection and precision farming in a mobile application / Muhammad Haziq Azmi by Azmi, Muhammad Haziq

    Published 2025
    “…The project will implement automated detection and disease management recommendation algorithms while evaluating the functionality and usability of the designed application. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Enhancing user authentication for cloud web-based application / Detar Beqo by Detar , Beqo

    Published 2018
    “…We have developed a cloud-based application that adapts the enhanced authentication method, and its security measurement were evaluated using IBM Application Security on Cloud tool. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Trajectory-based analysis in nonlinear navigation using extended kalman filter with different covariance matrix acquisition methods by Muhammad Haniff, Gusrial, Nur Aqilah, Othman, Hamzah, Ahmad, Bakri, Hassan, Nor Maniha, Abdul Ghani

    Published 2025
    “…Hence, the proposed method shows that the navigation performance can be improved by acquiring data from experimental setup for formulating initial covariance of Turtlebot3 Burger mobile robot in future applications.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Adaptive and Priority-based Resource Allocation for Efficient Resources Utilization in Mobile Edge Computing by Sharif, Z., Jung, L.T., Razzak, I., Alazab, M.

    Published 2021
    “…Extensive simulations were performed through ifogsim to evaluate the performance of the proposed method. Critical comparisons were made against closely related algorithms and techniques i.e., the NBIHA and the CORA-GT. …”
    Get full text
    Get full text
    Article
  11. 11

    Human activity and posture classification using smartphone sensors and Matlab mobile by Jamian, Syahirah, Gunawan, Teddy Surya, Kartiwi, Mira, Ahmad, Robiah, Kadir, Kushairy, Nordin, Muhammad Noor

    Published 2022
    “…Activity recognition has been used in various ways as technology has advanced, particularly using a smartphone-based approach. This work aims to evaluate the accuracy of the triaxial accelerometer in the Matlab Mobile and examine the development and performance of the algorithms in identifying human motions on individuals of similar ages and physical appearances. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12

    Design of Predictive Model for TCM Tongue Diagnosis In Malaysia Using Machine Learning by Koe, Jia Chi

    Published 2020
    “…The lack of objectivity and standard evaluation criteria in tongue diagnosis have restricted its development. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13

    Design of a Fuzzy Logic Controller for Skid Steer Mobile Robot by Abdul Rahman, Mohd Azizi

    Published 2009
    “…Data acquisition is done in a LABVIEW and a MATLAB control algorithm is called in LABVIEW. A real mobile robot, PUTRABOT2 was used to conduct the experiment. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR) by Chowdhury Sajadul Islam

    Published 2026
    “…To evaluate the model, the researcher split a 70/30 (130,200/55,800) train-test dataset. …”
    thesis::doctoral thesis
  15. 15

    Channel Modelling and Estimation in Multiple-Input Multiple-Output Orthogonal Frequency Division Multiplexing Wireless Communication Systems by Hezam, Mohammed Abdo Saeed

    Published 2008
    “…New time-domain (TD) adaptive estimation methods based on recursive least squares (RLS) and normalized least-mean squares (NLMS) algorithms are proposed. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A Mobile Application For Stock Price Prediction by Choy, Yi Tou

    Published 2021
    “…The evaluation methods were Root Mean Square Error and Mean Absolute Error. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    REGION-BASED ADAPTIVE DISTRIBUTED VIDEO CODING CODEC by ABDELRAHMAN ELAMIN, ABDELRAHMAN ELAMIN

    Published 2011
    “…Although the performance evaluations show rate-penalty but it is acceptable considering the simplicity of the proposed algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim by Masmuhallim, Anis Athirah

    Published 2024
    “…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Resource allocation based on interference coordination for Multicast-Broadcast Single Frequency Network (MBSFN) / Mohd Fahmi Azman by Mohd Fahmi , Azman

    Published 2013
    “…With enormous development in wireless mobile communication, this service can be easily implemented to achieve high system capacity and system throughput. …”
    Get full text
    Get full text
    Thesis
  20. 20