Search Results - (( user evaluation cell algorithm ) OR ( user identification method algorithm ))
Search alternatives:
- identification method »
- user identification »
- method algorithm »
- user evaluation »
- evaluation cell »
- cell algorithm »
-
1
Self-calibration algorithm for a pressure sensor with a real-time approach based on an artificial neural network
Published 2018“…Furthermore, the exposed analysis approach in this paper can be a useful methodology for the user to evaluate the performance of any measurement system in a real-time environment.…”
Get full text
Get full text
Get full text
Article -
2
Real time self-calibration algorithm of pressure sensor for robotic hand glove system
Published 2019“…This provides a useful methodology for the user to evaluate the performance of any measurement system in a real-time environment.…”
Get full text
Get full text
Thesis -
3
Effective predicate identification algorithm for XML retrieval
Published 2018“…Finally, an effective predicate identification algorithm (EPIA) which uses EBQS and STPS to return relevant predicates is introduced. …”
Get full text
Get full text
Conference or Workshop Item -
4
-
5
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
Get full text
Get full text
Get full text
Thesis -
6
Backhaul load and performance optimality of partial joint processing schemes in LTE-A networks
Published 2014“…However, the problem of performance degradation caused by InterCell-Interference (ICI) also raised for cell-edge users. …”
Get full text
Get full text
Thesis -
7
Quality of service and scheduling performance optimization in LTE networks / Abubakar Auwal Idris
Published 2017“…The future work will consider to simulate multi cell scenario and the system complexity evaluation. …”
Get full text
Get full text
Get full text
Thesis -
8
Handover Decision-Making Algorithm for 5G Heterogeneous Networks
Published 2023“…The TOPSIS evaluates the network quality and chooses the best network based on user preference. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
-
10
Performance evaluation of LTE scheduling techniques for heterogeneous traffic and different mobility scenarios
Published 2015“…In this paper five scheduling algorithms were investigated and their performance was evaluated in terms of Fairness Index, Peak Throughput, Average Throughput and Edge Cell User Throughput. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
11
Performance evaluation of LTE scheduling techniques for heterogeneous traffic and different mobility scenarios
Published 2014“…In this paper five scheduling algorithms were investigated and their performance was evaluated in terms of Fairness Index, Peak Throughput, Average Throughput and Edge Cell User Throughput. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
Effects of user selected conditions on modeling of dynamic systems using adaptive fuzzy model
Published 2001“…The implementation and the computational aspects of the training algorithm are also highlighted. Three examples of discrete-time nonlinear systems are used in the simulation study to show the effects of user selected conditions on the identification process. …”
Get full text
Get full text
Get full text
Article -
13
-
14
Eeg-Based Person Identification Using Multi-Levelwavelet Decomposition With Multi-Objective Flower Pollination Algorithm
Published 2020“…For addressing these points, a novel person identification method that is using EEG with multi-level wavelet decomposition and multi-objective flower pollination algorithm is proposed in this thesis. …”
Get full text
Get full text
Thesis -
15
A new dynamic code assignment algorithm for joint CDMA and SDMA system
Published 2008“…The probability of blocking is calculated to evaluate the system performance for different number of users and available codes. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
DEVELOPMENT OF IRIS RECOGNITION SYSTEM
Published 2016“…This project implements an iris recognition algorithm as a biometric identification. There is a need for reliable and security identification since typical identification methods using identity cards, passwords, and user name possess threats to the security of an organization because of human error. …”
Get full text
Get full text
Final Year Project -
17
-
18
Smart cards and the fingerprint: a framework for user identification and authentication
Published 2003“…This research believes that no single security method, algorithm, key or procedure is entirely secure. …”
Get full text
Get full text
Get full text
Article -
19
An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias
Published 2017“…Therefore, this project has proposed a method called token based alert notification. There are three algorithm developed for token based alert notification which is tokenization algorithm, token matching algorithm and item identification algorithm. …”
Get full text
Get full text
Thesis -
20
Deep Learning-Driven Mobility And Utility-Based Resource Management In Mm-Wave Enable Ultradense Heterogeneous Networks
Published 2025thesis::doctoral thesis
