Search Results - (( user evaluation ((step algorithm) OR (_ algorithm)) ) OR ( time estimation based algorithm ))
Search alternatives:
- estimation based »
- user evaluation »
- time estimation »
- step algorithm »
-
1
A real-time vision-based touchless interaction of virtual heart using integration of motion gesture interaction methods
Published 2014“…A Predefine Offset Screen Distance for Gesture Recognition is proposed. The flow of the algorithm can be divided into four steps. The first step is to calculate the offset line. …”
Get full text
Get full text
Academic Exercise -
2
Performance evaluation of multi-user detection in Cdma using micro-genetic algorithm
Published 2005Get full text
Get full text
Get full text
Proceeding Paper -
3
Segmentation of MRI brain images using statistical approaches
Published 2011“…Also, a filter-based image inhomogeneity-correction algorithm is proposed which uses the maximum filter for inhomogeneity field estimation. …”
Get full text
Get full text
Thesis -
4
Handover Decision-Making Algorithm for 5G Heterogeneous Networks
Published 2023“…The proposed algorithm reduces the number of unnecessary handovers by estimating the connection time to a small cell network using the dwell time prediction technique. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Speech enhancement using deep neural network based on mask estimation and harmonic regeneration noise reduction for single channel microphone
Published 2022“…With SNR of -5 dB, an improvement of 4% over DNN algorithm, 36% over conventional HRNR algorithm, and 12% over Log-MMSE algorithm are obtained. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
RSS-based indoor localization system with single base station
Published 2021“…It is demonstrated the system can identify user’s real-time location with a maximum estimation error below 0.7 m for 80% confidence Cumulative Distribution Function (CDF) user level, demonstrating the ability to accurately estimate the receiver’s location within the room. …”
Get full text
Get full text
Get full text
Article -
7
Effects of Different Superpixel Algorithms on Interactive Segmentations
Published 2022“…Though employed as pre-processing step in many interactive segmentation algorithms, to date, no study has been conducted to assess the effects of such incorporations on the segmentation algorithms. …”
Get full text
Get full text
Get full text
Article -
8
Q-learning based vertical handover decision algorithm in LTE-A two-tier macrocell-femtocell systems / Ammar Bathich
Published 2019“…A reduction in the average number of handovers, the average number of control signaling measurements and packet loss and delay is observed. At the same time, the system throughput was increased. The proposed algorithms reduced the handover number, packet delay and packet loss by 48%, 89% and 85% respectively, whereas the system throughput increased by 13% compared to reference algorithms.…”
Get full text
Get full text
Thesis -
9
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The purpose of this project are to construct and provide guidelines to develop a simulation model to evaluate cryptography algorithm in terms of encryption speed and descryption speed on UUM portal. …”
Get full text
Get full text
Get full text
Thesis -
10
Effects of Different Superpixel Algorithms on Interactive Segmentations
Published 2022“…Though employed as pre-processing step in many interactive segmentation algorithms, to date, no study has been conducted to assess the effects of such incorporations on the segmentation algorithms. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
11
Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis
Published 2024“…The Rivest-Shamir-Adleman (RSA) algorithm, known for its slow single-precision multiplication (spm) and overall running time, is not commonly employed to encrypt user data directly. …”
Get full text
Get full text
Get full text
Article -
12
Comparative of Rivest-Shamir-Adleman cryptosystem and its four variants using running time and memory consumption analysis
Published 2024“…The Rivest-Shamir-Adleman (RSA) algorithm, known for its slow single-precision multiplication (spm) and overall running time, is not commonly employed to encrypt user data directly. …”
Get full text
Get full text
Get full text
Article -
13
The Development Of System For Algorithms Visualization Using Simjava
Published 2020“…Algorithm visualization which is a form of high-level dynamic visualization of software that uses user interface techniques to portray and monitor the computational steps of algorithms. …”
Get full text
Get full text
Get full text
Article -
14
Real time self-calibration algorithm of pressure sensor for robotic hand glove system
Published 2019“…This provides a useful methodology for the user to evaluate the performance of any measurement system in a real-time environment.…”
Get full text
Get full text
Thesis -
15
Orthogonal Frequency Division Multiple Access resource unit allocation algorithms for IEEE 802.11AX medium access control protocol
Published 2024“…The simulation results demonstrated that the proposed algorithms significantly outperformed the benchmark algorithms across several metrics. …”
Get full text
Get full text
Get full text
Thesis -
16
Performance Analysis of Duty-Cycle Division Multiplexing for Optical Fiber Communication Systems
Published 2009“…At the same time, a model for BER estimation based on the decision algorithms is established. …”
Get full text
Get full text
Thesis -
17
Current Developments In Lte/Lte-Advanced : Adaptive-Proportional Fair Scheduling In Lte
Published 2015“…The most challenge of a PFS problem is the lack of analytic expression. Though the PFS algorithm has been a research focus for some time, the results are mainly obtained from computer simulations. …”
Get full text
Get full text
Get full text
Article -
18
Diagnosis of eyesight using Improved Clonal Selection Algorithm (ICLONALG) / Nor Khirda Masri
Published 2017“…The implementation of the algorithm has several step and process to take which are discussed in details in this paper. …”
Get full text
Get full text
Thesis -
19
A hybrid Method Of Centroid-Based Clustering And Meta-Heuristic For Personalized Web Search
Published 2024thesis::doctoral thesis -
20
Performance Enhancement Of Ultra-Wideband Power Control Using Ranging And Narrowband Interference Mitigation
Published 2008“…In this thesis we propose a maximum likelihood algorithm enhanced with synchronization scheme to estimate the time delay of direct-path signal in NLOS multi-path fading environment and mean acquisition time. …”
Get full text
Get full text
Thesis
