Search Results - (( mobile evaluation methods algorithm ) OR ( based information systems algorithm ))

Refine Results
  1. 1

    Pose estimation algorithm for mobile Augmented Reality based on inertial sensor fusion by Alam, Mir Suhail, Morshidi, Malik Arman, Gunawan, Teddy Surya, Olanrewaju, Rashidah Funke, Arifin, Fatchul

    Published 2021
    “…After extensive experiments, the validity of the proposed method was superior to the existing vision-based pose estimation algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Neighbour-based on-demand routing algorithms for mobile ad hoc networks by Ejmaa, Ali Mohamed E.

    Published 2017
    “…The dropping decision of the redundant RREQ in the NCPR algorithm completely relies on preset variables, such variables require to be set by the system administrator based on the scenario. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli by Dzulkifli, Muhammad Zulhilmie

    Published 2021
    “…Based on the previous report, some issues arise, such as time-consumption between the staff and the customer when ordering, lack of details and inconsistency of the manual system data. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A comprehensive overview of classical and modern route planning algorithms for self-driving mobile robots by Wan Daud, Wan Mohd Bukhari, Abu, Nur Syuhadah, Omar, Siti Nashayu, Sohaimeh, Shahirul Ashraf, Adli,, M. H.

    Published 2022
    “…Classical or traditional methods, such as Roadmaps (Visibility Graph and Voronoi Diagram), Potential Fields, and Cell Decomposition, and modern methodologies such as heuristic-based (Dijkstra Method, A* Algorithms, and D* Algorithms), metaheuristics algorithms (such as PSO, Bat Algorithm, ACO, and Genetic Algorithm), and neural systems such as fuzzy neural networks or fuzzy logic (FL) and Artificial Neural Networks (ANN) are described in this report. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias by Alias, Nur Farehah

    Published 2017
    “…Therefore, this project has proposed a method called token based alert notification. There are three algorithm developed for token based alert notification which is tokenization algorithm, token matching algorithm and item identification algorithm. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Performance evaluation of Location-Sensitive Handoff using positioning method / Azuwa Ali and Saiful Fadzli Salian by Ali, Azuwa, Salian, Saiful Fadzli

    Published 2009
    “…With the help of location information, handoff process can be optimize and increase the intelligent of radio resource management. …”
    Get full text
    Get full text
    Research Reports
  7. 7
  8. 8

    Reduced Set Kernel Principal Component Analysis (Rskpca) Algorithm for Palm Print Based Mobile Biometric System by Ibrahim, Noor Salwani

    Published 2015
    “…In this study mobile biometric system based on palm print modality is developed. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Seamless vertical handover technique for vehicular ad-hoc networks using artificial bee colony-particle swarm optimisation by Abdulwahhab, Mohanad Mazin

    Published 2019
    “…Firstly, we proposed a multi-criteria artificial bee colony hybrid with particle swarm optimisation algorithm (MC ABC-PSO) for evaluating the information gathered from the mobile nodes in the handover. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Multi-sensor fusion based on multiple classifier systems for human activity identification by Nweke, Henry Friday, Teh, Ying Wah, Mujtaba, Ghulam, Alo, Uzoma Rita, Al-garadi, Mohammed Ali

    Published 2019
    “…To provide compact feature vector representation, we studied hybrid bio-inspired evolutionary search algorithm and correlation-based feature selection method and evaluate their impact on extracted feature vectors from individual sensor modality. …”
    Get full text
    Get full text
    Article
  12. 12

    Enhancing user authentication for cloud web-based application / Detar Beqo by Detar , Beqo

    Published 2018
    “…The proposed authentication method, uses an enhanced method where the credentials are encrypted through an algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Hybrid intelligent approach for network intrusion detection by Al-Mohammed, Wael Hasan Ali

    Published 2015
    “…Hence, there must be substantial improvement in network intrusion detection techniques and systems. Due to the prevailing limitations of finding novel attacks, high false detection, and accuracy in previous intrusion detection approaches, this study has proposed a hybrid intelligent approach for network intrusion detection based on k-means clustering algorithm and support vector machine classification algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…(iii) To evaluate the usability performance of the developed GPS-Based Physical Identity and Access Management (PIAM) System by using the System Usability Scale (SUS) approach. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  15. 15

    Personalized job recommender system using content-based filtering for UiTM Machang graduates by Rosli, Norhalili

    Published 2025
    “…The System Usability Scale (SUS) and User Acceptance Testing (UAT) are used to evaluate the system’s usability because they are well-known and trusted methods for measuring user experience. …”
    Get full text
    Get full text
    Student Project
  16. 16

    Framework for stream clustering of trajectories based on temporal micro clustering technique by Abdulrazzaq, Musaab Riyadh

    Published 2018
    “…A comprehensive experimental analysis was conducted to evaluate the efficiency and effectiveness of the proposed algorithms (ONF-TRS, CC-TRS). …”
    Get full text
    Get full text
    Thesis
  17. 17

    Design of a Fuzzy Logic Controller for Skid Steer Mobile Robot by Abdul Rahman, Mohd Azizi

    Published 2009
    “…Data acquisition is done in a LABVIEW and a MATLAB control algorithm is called in LABVIEW. A real mobile robot, PUTRABOT2 was used to conduct the experiment. …”
    Get full text
    Get full text
    Thesis
  18. 18

    REGION-BASED ADAPTIVE DISTRIBUTED VIDEO CODING CODEC by ABDELRAHMAN ELAMIN, ABDELRAHMAN ELAMIN

    Published 2011
    “…Although the performance evaluations show rate-penalty but it is acceptable considering the simplicity of the proposed algorithm. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Content-based indexing of low resolution documents by Md Nor, Danial

    Published 2016
    “…The assessment of the proposed indexing scheme is conducted based on recall and precision, a standard CBIR retrieval performance evaluation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Hybrid indoor positioning utilizing multipath- assisted fingerprint and geometric estimation for single base station systems by Manap, Zahariah

    Published 2025
    “…This thesis proposes a hybrid indoor positioning method for single base station systems by jointly utilizing the fingerprinting method and geometric multilateration. …”
    Get full text
    Get full text
    Thesis