Search Results - (( user evaluation cell algorithm ) OR ( user identification method algorithm ))

Refine Results
  1. 1

    Self-calibration algorithm for a pressure sensor with a real-time approach based on an artificial neural network by M. Almassri, Ahmed M., Wan Hasan, Wan Zuha, Ahmad, Siti Anom, Shafie, Suhaidi, Wada, Chikamune, Horio, Keiichi

    Published 2018
    “…Furthermore, the exposed analysis approach in this paper can be a useful methodology for the user to evaluate the performance of any measurement system in a real-time environment.…”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Real time self-calibration algorithm of pressure sensor for robotic hand glove system by Almassri, Ahmed M. M.

    Published 2019
    “…This provides a useful methodology for the user to evaluate the performance of any measurement system in a real-time environment.…”
    Get full text
    Get full text
    Thesis
  3. 3

    Effective predicate identification algorithm for XML retrieval by Roko, Abubakar, C. Doraisamy, Shyamala, Nakone, Bello

    Published 2018
    “…Finally, an effective predicate identification algorithm (EPIA) which uses EBQS and STPS to return relevant predicates is introduced. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5

    Effective query structuring with ranking using named entity categories for XML retrieval by Roko, Abubakar

    Published 2016
    “…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Backhaul load and performance optimality of partial joint processing schemes in LTE-A networks by Kousha, Mohammad

    Published 2014
    “…However, the problem of performance degradation caused by InterCell-Interference (ICI) also raised for cell-edge users. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Quality of service and scheduling performance optimization in LTE networks / Abubakar Auwal Idris by Abubakar Auwal , Idris

    Published 2017
    “…The future work will consider to simulate multi cell scenario and the system complexity evaluation. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10

    Performance evaluation of LTE scheduling techniques for heterogeneous traffic and different mobility scenarios by Sukeran, Lukmanhakim, Habaebi, Mohamed Hadi, Zyou, Al-Hareth, Ahmed, Musse Mohamud, Hameed, Shihab A, Azman, Amelia Wong, Islam, Md Rafiqul

    Published 2015
    “…In this paper five scheduling algorithms were investigated and their performance was evaluated in terms of Fairness Index, Peak Throughput, Average Throughput and Edge Cell User Throughput. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Performance evaluation of LTE scheduling techniques for heterogeneous traffic and different mobility scenarios by Sukeran, Lukmanhakim, Habaebi, Mohamed Hadi, Zyoud, Al-Hareth, Musse, Mohamud Ahmed, Hameed, Shihab A., Azman, Amelia Wong, Islam, Md. Rafiqul

    Published 2014
    “…In this paper five scheduling algorithms were investigated and their performance was evaluated in terms of Fairness Index, Peak Throughput, Average Throughput and Edge Cell User Throughput. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12

    Effects of user selected conditions on modeling of dynamic systems using adaptive fuzzy model by Yaacob, Mohd. Shafiek, Jamaluddin, Hishamuddin

    Published 2001
    “…The implementation and the computational aspects of the training algorithm are also highlighted. Three examples of discrete-time nonlinear systems are used in the simulation study to show the effects of user selected conditions on the identification process. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Eeg-Based Person Identification Using Multi-Levelwavelet Decomposition With Multi-Objective Flower Pollination Algorithm by Yahya Alyasseri, Zaid Abdi Alkareem

    Published 2020
    “…For addressing these points, a novel person identification method that is using EEG with multi-level wavelet decomposition and multi-objective flower pollination algorithm is proposed in this thesis. …”
    Get full text
    Get full text
    Thesis
  15. 15

    A new dynamic code assignment algorithm for joint CDMA and SDMA system by Odeh, Nidhal A. S., Khatun, Sabira, Ismail, Alyani, Mohd Ali, Borhanuddin

    Published 2008
    “…The probability of blocking is calculated to evaluate the system performance for different number of users and available codes. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    DEVELOPMENT OF IRIS RECOGNITION SYSTEM by Mohd Kamarudin, Nur Eliza

    Published 2016
    “…This project implements an iris recognition algorithm as a biometric identification. There is a need for reliable and security identification since typical identification methods using identity cards, passwords, and user name possess threats to the security of an organization because of human error. …”
    Get full text
    Get full text
    Final Year Project
  17. 17
  18. 18

    Smart cards and the fingerprint: a framework for user identification and authentication by Omar, M. H., Din, Roshidi, Tahir, H. M.

    Published 2003
    “…This research believes that no single security method, algorithm, key or procedure is entirely secure. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias by Alias, Nur Farehah

    Published 2017
    “…Therefore, this project has proposed a method called token based alert notification. There are three algorithm developed for token based alert notification which is tokenization algorithm, token matching algorithm and item identification algorithm. …”
    Get full text
    Get full text
    Thesis
  20. 20