Search Results - (( mobile evaluation study algorithm ) OR ( user identification _ algorithm ))*
Search alternatives:
- user identification »
- mobile evaluation »
- evaluation study »
-
1
Convolutional neural network based mobile application for poisonous mushroom detection
Published 2025“…The application leverages a Convolutional Neural Network (CNN) algorithm to accurately classify mushrooms based on user-submitted images. …”
Get full text
Get full text
Get full text
Article -
2
A comparative study on ant-colony algorithm and genetic algorithm for mobile robot planning.
Published 2024“…Focusing on routing optimization, the study evaluates Ant-Colony Optimization (ACO) and Genetic Algorithm (GA) in Mobile Robot Planning. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
-
4
Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim
Published 2024“…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
Get full text
Get full text
Thesis -
5
Effective predicate identification algorithm for XML retrieval
Published 2018“…Finally, an effective predicate identification algorithm (EPIA) which uses EBQS and STPS to return relevant predicates is introduced. …”
Get full text
Get full text
Conference or Workshop Item -
6
Performance evaluation of vertical handoff in fourth generation (4G) networks model
Published 2009Get full text
Working Paper -
7
Analysis of Online Social Network Connections for Identification of Influential Users
Published 2018“…This article presents a detailed survey of influential users’ identification algorithms and their performance evaluation approaches in OSNs. …”
Get full text
Get full text
Article -
8
A coalition model for efficient indexing in wireless sensor network with random mobility / Hazem Jihad Ali Badarneh
Published 2021“…The second evaluation divides into three scenarios. The first one evaluates Coalition-Based Index-Tree framework independently, without any effect from Dynamic-Coalition framework and Static-Coalition algorithm. …”
Get full text
Get full text
Get full text
Thesis -
9
-
10
Machine learning model for performance prediction in mobile network management / Muhammad Hazim Wahid
Published 2022“…This study aims to propose the best machine learning algorithm for predicting mobile network performance. …”
Get full text
Get full text
Thesis -
11
Systematic Analysis on Mobile Botnet Detection Techniques Using Genetic Algorithm
Published 2024“…A case study was carried out to reverse engineering the mobile botnet codes. …”
Proceedings Paper -
12
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
Get full text
Get full text
Get full text
Thesis -
13
Development of person identification application for video surveillance
Published 2022“…The information of the tracker is necessary for person identification. Third, person identification implemented the CNN model for training. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Systematic analysis on mobile botnet detection techniques using genetic algorithm
Published 2024Conference Paper -
15
A comparison study of classifier algorithms for mobile-phone’s accelerometer based activity recognition
Published 2012“…As a continuation of the research towards the search for a suitable and reliable algorithm for real-time activity recognition using mobile phone, an evaluation and comparison study of the performance of seven different categories of classifier algorithms in classifying user activities were conducted. …”
Get full text
Get full text
Get full text
Article -
16
Improving performance of mobile ad hoc networks using efficient Tactical On Demand Distance Vector (TAODV) routing algorithm
Published 2012“…This paper presents that the proposed on demand routing algorithm performs better in mobile ad-hoc environment than other traditional algorithms. …”
Get full text
Get full text
Article -
17
Identifying the influential spreaders in multilayer interactions of online social networks
Published 2016“…The measurement results are found to be more reliable when the identification algorithms are applied to proposed topological representation compared when these algorithms are applied to single layer representations.…”
Get full text
Get full text
Article -
18
Permission-based fault tolerant mutual exclusion algorithm for mobile Ad Hoc networks
Published 2015“…This study focuses on resolving the problem of mutual exclusion in mobile ad hoc networks. …”
Get full text
Get full text
Thesis -
19
An efficient fuzzy clustering algorithm for mining user session clusters on web log data
Published 2021“…Because there are so many end-user sessions and URL resources, the size of web user session data is enormous. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Age And Gender Recognition Mobile App
Published 2023“…Through reviewing and evaluate the existing age and gender recognition mobile apps and their deep learning algorithm, the study found the number of existing age and gender recognition mobile app is very less. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD
