Search Results - (( mobile evaluation modified algorithm ) OR ( writer classification based algorithm ))

Refine Results
  1. 1

    Discretization of integrated moment invariants for writer identification by Draman @ Muda, Azah Kamilah, Shamsuddin, Siti Maryam, Darus, Maslina

    Published 2008
    “…Subsequently, the discrete proposed features undertake discretization procedure prior to classification for better feature representation and splendid classification accuracy. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2
  3. 3
  4. 4

    Adapting the conventional packet scheduling algorithms for simultaneous support of 5G multimedia traffic mix by Mohamed Rasied, Thaahirah Shireen, Mohd Ramli, Huda Adibah, Abdul Rahman, Farah Diyana, Najeeb, Athaur Rahman

    Published 2023
    “…Given that devising a new packet scheduling algorithm is time-consuming and requires additional effort, this paper slightly modifies several renowned conventional packet scheduling algorithms and evaluates their performance when simultaneously supporting Ultra-Reliable Low Latency Communication (uRLLC) and enhanced Mobile Broadband (eMBB) in the downlink 5G. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  5. 5

    Design and evaluation on adaptive fuzzy speed control of mobile robot by Abdollahi, Mohammadreza

    Published 2011
    “…Both data acquisition and control algorithm are developed by using LabVIEW. A four-wheel mobile robot, PUTRABOT2, is used to conduct the experiments. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Arabic Calligraphy Classification using Triangle Model for Digital Jawi Paleography Analysis by Azmi, Mohd Sanusi, Muda, A. K.

    Published 2011
    “…Calligraphy classification of the ancient manuscripts gives useful information to paleographers. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Arabic Calligraphy Classification using Triangle Model for Digital Jawi Paleography Analysis by Mohd Sanusi, Azmi, Azah Kamilah, Muda

    Published 2011
    “…Calligraphy classification of the ancient manuscripts gives useful information to paleographers. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Enhanced Ad Hoc On-Demand Distance Vector Routing Protocol For Mobile Ad Hoc Network Internet Connectivity by Gurusamy, Gobi

    Published 2006
    “…In this thesis the ad hoc routing protocol AODV is used and modified to examine the interconnection between a mobile ad hoc network and the Internet. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Route optimization security in mobile IPv6 wireless networks: a test-bed experience by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Security enhancement of route optimization in mobile IPv6 networks by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Features Extraction of Arabic Calligraphy using extended Triangle Model for Digital Jawi Paleography Analysis by Mohd Sanusi, Azmi, Muda, A. K., Khadijah Wan, Mohd Ghazali

    Published 2013
    “…The information helps paleographer to identify date, writer, number of writers, place of origin, and the originality of manuscripts. …”
    Get full text
    Get full text
    Article
  12. 12

    Beyond Sentiment Analysis: A Review of Recent Trends in Text Based Sentiment Analysis and Emotion Detection by Lai Po Hung, Suraya Alias

    Published 2023
    “…We also look at the models of emotion classes that are generally referenced. The trend of text-based emotion detection has shifted from the early keyword-based comparisons to machine learning and deep learning algorithms that provide more flexibility to the task and better performance.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Speech enhancement using deep neural network based on mask estimation and harmonic regeneration noise reduction for single channel microphone by Md Jamal, Norezmi

    Published 2022
    “…With SNR of -5 dB, an improvement of 4% over DNN algorithm, 36% over conventional HRNR algorithm, and 12% over Log-MMSE algorithm are obtained. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Ensemble based categorization and adaptive model for malware detection by Ahmad Zabidi, Muhammad Najmi, Maarof, Mohd Aizaini, Zainal, Anazida

    Published 2011
    “…Current malware detection method involved string search algorithm which based on the pattern detection. This may include the use of signature based method. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Android: S-Based Technique in Mobile Malware Detection by Rahiwan Nazar, Romli, Mohamad Fadli, Zolkipli, Ali, Al Fahim Mubarak, Muhammed Ramiza, Ramli

    Published 2018
    “…In order to overcome malware, concern in mobile, we propose a new framework for malware detection which is signature based technique using pattern matching. This framework uses signature number and Secure Hash Algorithm (SHA) as signature in the detection process. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    A New Technique To Design Coating Structure For Energy Saving Glass Using The Genetic Algorithm by Azmin, Farah Ayuni

    Published 2017
    “…This research proposed a modified regular shape which is based on the best selected regular shape, modified using genetic algorithm on the central processing unit (CPU). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Single channel speech enhancement using Wiener filter and compressive sensing by Sulong, Amart, Gunawan, Teddy Surya, Khalifa, Othman Omran, Kartiwi, Mira, Dao, Hassan

    Published 2017
    “…The speech enhancement algorithms are utilized to overcome multiple limitation factors in recent applications such as mobile phone and communication channel. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Quality of service and scheduling performance optimization in LTE networks / Abubakar Auwal Idris by Abubakar Auwal , Idris

    Published 2017
    “…The performance of the developed VRTSA is evaluated and compared with three well-known downlink scheduling algorithms in LTE such as Proportional Fair (PF), Modified Largest Weight Delay First (MLWDF), Exponential Proportional Fair (EXP/PF) as well as recent algorithm called LTTI. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    A novel scheduling algorithm based on game theory and multicriteria decision making in LTE network by Hindia, M.N., Reza, A.W., Noordin, K.A.

    Published 2015
    “…The proposed algorithm is compared with existing algorithms, such as proportional fairness, modified largest weighted delay first, and exponential rule schemes. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Adaptive manet OLSR routing protocol for optimal route selection in high dynamic network by Al-Kharasani, Nori Mohammed Abdulkarem

    Published 2020
    “…The proposed Quality of Path QoP metric is incorporated into the modified relay selection algorithm, which improves the efficiency of relay selection mechanism to find optimal path with high link quality. …”
    Get full text
    Get full text
    Thesis