Search Results - (( mobile evaluation modified algorithm ) OR ( writer classification based algorithm ))
Search alternatives:
- writer classification »
- classification based »
- evaluation modified »
- mobile evaluation »
-
1
Discretization of integrated moment invariants for writer identification
Published 2008“…Subsequently, the discrete proposed features undertake discretization procedure prior to classification for better feature representation and splendid classification accuracy. …”
Get full text
Get full text
Conference or Workshop Item -
2
-
3
-
4
Adapting the conventional packet scheduling algorithms for simultaneous support of 5G multimedia traffic mix
Published 2023“…Given that devising a new packet scheduling algorithm is time-consuming and requires additional effort, this paper slightly modifies several renowned conventional packet scheduling algorithms and evaluates their performance when simultaneously supporting Ultra-Reliable Low Latency Communication (uRLLC) and enhanced Mobile Broadband (eMBB) in the downlink 5G. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
5
Design and evaluation on adaptive fuzzy speed control of mobile robot
Published 2011“…Both data acquisition and control algorithm are developed by using LabVIEW. A four-wheel mobile robot, PUTRABOT2, is used to conduct the experiments. …”
Get full text
Get full text
Thesis -
6
Arabic Calligraphy Classification using Triangle Model for Digital Jawi Paleography Analysis
Published 2011“…Calligraphy classification of the ancient manuscripts gives useful information to paleographers. …”
Get full text
Get full text
Conference or Workshop Item -
7
Arabic Calligraphy Classification using Triangle Model for Digital Jawi Paleography Analysis
Published 2011“…Calligraphy classification of the ancient manuscripts gives useful information to paleographers. …”
Get full text
Get full text
Conference or Workshop Item -
8
Enhanced Ad Hoc On-Demand Distance Vector Routing Protocol For Mobile Ad Hoc Network Internet Connectivity
Published 2006“…In this thesis the ad hoc routing protocol AODV is used and modified to examine the interconnection between a mobile ad hoc network and the Internet. …”
Get full text
Get full text
Thesis -
9
Route optimization security in mobile IPv6 wireless networks: a test-bed experience
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Conference or Workshop Item -
10
Security enhancement of route optimization in mobile IPv6 networks
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Get full text
Article -
11
Features Extraction of Arabic Calligraphy using extended Triangle Model for Digital Jawi Paleography Analysis
Published 2013“…The information helps paleographer to identify date, writer, number of writers, place of origin, and the originality of manuscripts. …”
Get full text
Get full text
Article -
12
Beyond Sentiment Analysis: A Review of Recent Trends in Text Based Sentiment Analysis and Emotion Detection
Published 2023“…We also look at the models of emotion classes that are generally referenced. The trend of text-based emotion detection has shifted from the early keyword-based comparisons to machine learning and deep learning algorithms that provide more flexibility to the task and better performance.…”
Get full text
Get full text
Get full text
Get full text
Article -
13
Speech enhancement using deep neural network based on mask estimation and harmonic regeneration noise reduction for single channel microphone
Published 2022“…With SNR of -5 dB, an improvement of 4% over DNN algorithm, 36% over conventional HRNR algorithm, and 12% over Log-MMSE algorithm are obtained. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Ensemble based categorization and adaptive model for malware detection
Published 2011“…Current malware detection method involved string search algorithm which based on the pattern detection. This may include the use of signature based method. …”
Get full text
Get full text
Get full text
Article -
15
Android: S-Based Technique in Mobile Malware Detection
Published 2018“…In order to overcome malware, concern in mobile, we propose a new framework for malware detection which is signature based technique using pattern matching. This framework uses signature number and Secure Hash Algorithm (SHA) as signature in the detection process. …”
Get full text
Get full text
Get full text
Article -
16
A New Technique To Design Coating Structure For Energy Saving Glass Using The Genetic Algorithm
Published 2017“…This research proposed a modified regular shape which is based on the best selected regular shape, modified using genetic algorithm on the central processing unit (CPU). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Single channel speech enhancement using Wiener filter and compressive sensing
Published 2017“…The speech enhancement algorithms are utilized to overcome multiple limitation factors in recent applications such as mobile phone and communication channel. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Quality of service and scheduling performance optimization in LTE networks / Abubakar Auwal Idris
Published 2017“…The performance of the developed VRTSA is evaluated and compared with three well-known downlink scheduling algorithms in LTE such as Proportional Fair (PF), Modified Largest Weight Delay First (MLWDF), Exponential Proportional Fair (EXP/PF) as well as recent algorithm called LTTI. …”
Get full text
Get full text
Get full text
Thesis -
19
A novel scheduling algorithm based on game theory and multicriteria decision making in LTE network
Published 2015“…The proposed algorithm is compared with existing algorithms, such as proportional fairness, modified largest weighted delay first, and exponential rule schemes. …”
Get full text
Get full text
Get full text
Article -
20
Adaptive manet OLSR routing protocol for optimal route selection in high dynamic network
Published 2020“…The proposed Quality of Path QoP metric is incorporated into the modified relay selection algorithm, which improves the efficiency of relay selection mechanism to find optimal path with high link quality. …”
Get full text
Get full text
Thesis
