Search Results - (( mobile evaluation model algorithm ) OR ( user identification using algorithm ))
Search alternatives:
- identification using »
- user identification »
- mobile evaluation »
- model algorithm »
- using algorithm »
-
1
Convolutional neural network based mobile application for poisonous mushroom detection
Published 2025“…To address these issues, this study aims to develop a mushroom detection prototype specifically for identifying poisonous mushrooms using a mobile application. The application leverages a Convolutional Neural Network (CNN) algorithm to accurately classify mushrooms based on user-submitted images. …”
Get full text
Get full text
Get full text
Article -
2
A Mobile Application For Stock Price Prediction
Published 2021“…In conclusion, this project’s objectives were achieved by developing the mobile application for stock price prediction using the best time series algorithm evaluated, which is ARIMA.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
A coalition model for efficient indexing in wireless sensor network with random mobility / Hazem Jihad Ali Badarneh
Published 2021“…The proposed model consists of Dynamic-Coalition framework, Static-Coalition algorithm, and Coalition-Based Index-Tree framework. …”
Get full text
Get full text
Get full text
Thesis -
4
Performance evaluation of vertical handoff in fourth generation (4G) networks model
Published 2009Get full text
Working Paper -
5
Effective predicate identification algorithm for XML retrieval
Published 2018“…Finally, an effective predicate identification algorithm (EPIA) which uses EBQS and STPS to return relevant predicates is introduced. …”
Get full text
Get full text
Conference or Workshop Item -
6
-
7
Quality of service in mobile IP networks with parametric multi-channel routing algorithms based on linear programming approach
Published 2018“…The proposed algorithms are evaluated by considering different metrics, computation modellings, and measurements on the simulation. …”
Get full text
Get full text
Thesis -
8
-
9
Evaluating mobility management models for content forwarding in named data networking environments
Published 2019“…In this paper, we evaluate the performance of mobility management models used in forwarding NDN contents to a next hop. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
10
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
Get full text
Get full text
Get full text
Thesis -
11
-
12
-
13
Eeg-Based Person Identification Using Multi-Levelwavelet Decomposition With Multi-Objective Flower Pollination Algorithm
Published 2020“…For addressing these points, a novel person identification method that is using EEG with multi-level wavelet decomposition and multi-objective flower pollination algorithm is proposed in this thesis. …”
Get full text
Get full text
Thesis -
14
Effects of user selected conditions on modeling of dynamic systems using adaptive fuzzy model
Published 2001“…The implementation and the computational aspects of the training algorithm are also highlighted. Three examples of discrete-time nonlinear systems are used in the simulation study to show the effects of user selected conditions on the identification process. …”
Get full text
Get full text
Get full text
Article -
15
An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias
Published 2017“…Android smartphone is used in order to test this algorithm.…”
Get full text
Get full text
Thesis -
16
Context-Aware Recommender System based on machine learning in tourist mobile application / Nor Liza Saad … [et al.]
Published 2022“…From the machine learning evaluation, Random Forest algorithm has generated the most accurate prediction compared to Decision Tree, Logistic Regression and Generalized Linear Model. …”
Get full text
Get full text
Get full text
Article -
17
Performance evaluation of LTE scheduling techniques for heterogeneous traffic and different mobility scenarios
Published 2015“…The simulation takes into account different types of traffic for several mobility scenarios and propagation channel models. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
18
Performance evaluation of enhanced MANETs routing protocols under video traffics, for different mobility and scalability models using OPNET
Published 2017“…Different mobility and scalability scenarios are evaluated after simulation of network with the help of OPNET modeler simulator…”
Get full text
Get full text
Get full text
Article -
19
Performance evaluation of LTE scheduling techniques for heterogeneous traffic and different mobility scenarios
Published 2014“…The simulation takes into account different types of traffic for several mobility scenarios and propagation channel models. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
20
Smart cards and the fingerprint: a framework for user identification and authentication
Published 2003“…As a result, the research proposed a framework for user identification and authentication in automatic-teller-machine (ATM) systems using fingerprints and smart cards as opposed to the PIN and magnetic-stripe cards.…”
Get full text
Get full text
Get full text
Article
