Search Results - (( mobile evaluation tree algorithm ) OR ( _ identification based algorithm ))*

Refine Results
  1. 1

    Multi-sensor fusion based on multiple classifier systems for human activity identification by Nweke, Henry Friday, Teh, Ying Wah, Mujtaba, Ghulam, Alo, Uzoma Rita, Al-garadi, Mohammed Ali

    Published 2019
    “…To provide compact feature vector representation, we studied hybrid bio-inspired evolutionary search algorithm and correlation-based feature selection method and evaluate their impact on extracted feature vectors from individual sensor modality. …”
    Get full text
    Get full text
    Article
  2. 2

    A coalition model for efficient indexing in wireless sensor network with random mobility / Hazem Jihad Ali Badarneh by Hazem Jihad , Ali Badarneh

    Published 2021
    “…The second evaluation divides into three scenarios. The first one evaluates Coalition-Based Index-Tree framework independently, without any effect from Dynamic-Coalition framework and Static-Coalition algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Optimized routing algorithm for mobile multicast source in Wireless Mesh Networks by Sanni, Mistura Laide, Hassan Abdalla Hashim, Aisha, Hassan, Wan Haslina, Anwar, Farhat, Ahmed, Gharib Subhi Mahmoud

    Published 2015
    “…Thus this paper proposes a Differential Evolution based optimized mobile multicast routing algorithm for the shared tree architecture. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  4. 4

    Content-based indexing of low resolution documents by Md Nor, Danial

    Published 2016
    “…The assessment of the proposed indexing scheme is conducted based on recall and precision, a standard CBIR retrieval performance evaluation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    A new multicast-based architecture to support host mobility in IPv6 by M. Ali, Borhanuddin, Habaebi, Mohamed Hadi, AI-Talib, Sahar

    Published 2003
    “…A new multicast group joidleave mechanism for mobile nodes (MNs) is proposed. The mechanism is based on hash algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6

    A new multicast-based architecture to support host mobility in IPv6 by Mohd Ali, Borhanuddin, Habaebi, Mohamed Hadi, Al-Talib, Sahar Abdul Aziz

    Published 2003
    “…The branches of the tree grow and shrink to reach the mobile node when necessary. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Context-Aware Recommender System based on machine learning in tourist mobile application / Nor Liza Saad … [et al.] by Saad, Nor Liza, Khairudin, Nurkhairizan, Azizan, Azilawati, Abd Rahman, Abdullah Sani, Ibrahim, Roslina

    Published 2022
    “…From the machine learning evaluation, Random Forest algorithm has generated the most accurate prediction compared to Decision Tree, Logistic Regression and Generalized Linear Model. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Extracting crown morphology with a low-cost mobile LiDAR scanning system in the natural environment by Wang, Kai, Zhou, Jun, Zhang, Wenhai, Zhang, Baohua

    Published 2021
    “…The algorithm defined in this study was evaluated with manual measurements as reference, and the morphological parameters of the canopy obtained using the LOAM and LeGO-LOAM algorithms as the basic framework were compared. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Scalable rekeying algorithm in IEEE 802.16e by Sadeghi, Mohammad Mehdi Gilanian, Mohd Ali, Borhanuddin, Ma, Maode, Ab Manan, Jamalul-lail, Noordin, Nor Kamariah, Khatun, Sabira

    Published 2011
    “…This paper proposes a Scalable Rekeying Algorithm (SRA) based on a complete binary tree structure. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Multicast-Based Mobile Ipv6 Join/Leave Mechanism Software by A.M. Ali, Sahar

    Published 2003
    “…Performance during handoff where the mobile moves from one cell, or coverage area, to another is a significant factor in evaluating wireless networks.…”
    Get full text
    Get full text
    Thesis
  11. 11

    Scalable rekeying algorithm in IEEE 802.16e by Gilanian Sadeghi, Mohammad Mehdi, Borhanuddin, Mohd Ali, Ma, Maode, Jamalul-lail, Ab Manan, Nor Kamariah, Noordin, Sabira, Khatun

    Published 2011
    “…This paper proposes a Scalable Rekeying Algorithm (SRA) based on a complete binary tree structure. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13

    Recursive Subspace Identification Algorithm Using The Propagator Based Method by Jamaludin, Irma Wani, Abdul Wahab, Norhaliza

    Published 2017
    “…In this paper, the recursive subspace identification algorithm based on the propagator method which avoids the SVD computation is proposed. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Reverse migration prediction model based on machine learning / Azreen Anuar by Anuar, Azreen

    Published 2024
    “…For this purpose, three (3) algorithms have been assessed, namely, the Random Forest, Decision Tree, and Gradient Boosted Tree. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Hybrid DE-PEM algorithm for identification of UAV helicopter by Tijani, Ismaila, Akmeliawati, Rini, Legowo, Ari, Budiyono, Agus, Abdul Muthalif, Asan Gani

    Published 2014
    “…Practical implications – The identification algorithm is expected to facilitate the required model development for model-based control design for autonomous helicopter development. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Position-based multicast routing in mobile ad hoc networks: an analytical study by Qabajeh, Mohammad M., Hassan Abdalla Hashim, Aisha, Khalifa, Othman Omran, Qabajeh, Liana K.

    Published 2012
    “…PBQMRP builds a source multicast tree guided by the geographic information of the mobile nodes, which helps in achieving more efficient multicast delivery. …”
    Get full text
    Get full text
    Article
  17. 17

    Smoothed functional algorithm with norm-limited update vector for identification of continuous-time fractional-order Hammerstein Models by Mok, Ren Hao, Mohd Ashraf, Ahmad

    Published 2024
    “…In particular, the standard smoothed functional algorithm (SFA) based method is modified by implementing a limit function in the update vector of the standard SFA based method to solve the issue of high tendency of divergence during the identification process. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification by Abd Samad, Md Fahmi

    Published 2011
    “…A deterministic mutation-based algorithm is introduced to overcome this problem. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Identification of continuous-time hammerstein system using sine cosine algorithm by E. F., Junis, J. J., Jui, Mohd Helmi, Suid, Mohd Ashraf, Ahmad

    Published 2019
    “…This paper presents the development of identification of continuous-time Hammerstein systems based on Sine Cosine Algorithm (SCA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Hybrid DE and PEM algorithm for identification of small scale Autonomous helicopter model by Legowo, Ari

    Published 2012
    “…A hybrid identification algorithm based on Differential Evolution (DE) and PEM is proposed in this study for effective identification of a small scale helicopter's model parameters. …”
    Get full text
    Get full text
    Monograph