Search Results - (( user evaluation sensor algorithm ) OR ( using optimization based algorithm ))
Search alternatives:
- evaluation sensor »
- sensor algorithm »
- user evaluation »
-
1
Optimizing Cloud Storage Costs: Introducing the Pre-Evaluation-Based Cost Optimization (PECSCO) Mechanism
Published 2025“…The core of the algorithm utilizes a Genetic Algorithm (GA) to find the optimal position for the first evaluator by minimizing the total distance between this evaluator and all CCTV nodes, aiming for surveillance efficiency. …”
Conference paper -
2
Mobile data gathering algorithms for wireless sensor networks
Published 2014“…These mobile elements will go to each transmission range of each respective sensor to upload its data. In this research, a Mobile Data Gathering based Network Layout (MDG-NL) algorithm is proposed. …”
Get full text
Get full text
Thesis -
3
Study of hand gesture recognition using impulse radio ultra wideband (IRUWB) radar sensor
Published 2023“…These include exploring recognition of gestures performed by two hands simultaneously, scalability to different environments, optimal sensor placement, and addressing user variability. …”
Get full text
Get full text
Get full text
Thesis -
4
Framework for stream clustering of trajectories based on temporal micro clustering technique
Published 2018“…A comprehensive experimental analysis was conducted to evaluate the efficiency and effectiveness of the proposed algorithms (ONF-TRS, CC-TRS). …”
Get full text
Get full text
Thesis -
5
Secure ACO-Based Wireless Sensor Network Routing Algorithm for IoT
Published 2021“…The perception of ensuring security is expensive in terms of computation, power and user-interface components because of low-power IoT objects or sensor nodes. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
A wheelchair sitting posture detection system using pressure sensors
Published 2024“…All the classification algorithms were evaluated by using the k-fold cross validation method. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
7
-
8
Integrated multi sensors and camera video sequence application for performance monitoring in archery
Published 2018“…The three camera views with the five body sensors are integrated into a single computer application which enables the user to view all the data in a single user interface. …”
Get full text
Get full text
Conference or Workshop Item -
9
A comparison study of classifier algorithms for mobile-phone’s accelerometer based activity recognition
Published 2012“…As a continuation of the research towards the search for a suitable and reliable algorithm for real-time activity recognition using mobile phone, an evaluation and comparison study of the performance of seven different categories of classifier algorithms in classifying user activities were conducted. …”
Get full text
Get full text
Get full text
Article -
10
Mobility-aware Offloading Decision For Multi-access Edge Computing In 5g Networks
Published 2024journal::journal article -
11
AUTOMATED GUIDED ROBOT (AGR)
Published 2007“…Algorithm conversion to C code programming has been done throughout the project for the obstacle avoidance and path planning algorithms based upon the GA platform ofAI.…”
Get full text
Get full text
Final Year Project -
12
Jogging activity recognition using k-NN algorithm
Published 2022“…Jogging activity recognition using the k-NN algorithm is a system that can help users collect information data of user speed movement using speed sensor and give the classification of jogging activity to the user. …”
Get full text
Get full text
Get full text
Academic Exercise -
13
Self-calibration algorithm for a pressure sensor with a real-time approach based on an artificial neural network
Published 2018“…The self-calibration algorithm should be able to fix major problems in the pressure sensor such as hysteresis, variation in gain and lack of linearity with high accuracy. …”
Get full text
Get full text
Get full text
Article -
14
Integrated multi sensors and camera video sequence application for performance monitoring in archery
Published 2017“…The three camera views with the five body sensors are integrated into a single computer application which enables the user to view all the data in a single user interface. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Integrated multi sensors and camera video sequence application for performance monitoring in archery
Published 2018“…The three camera views with the five body sensors are integrated into a single computer application which enables the user to view all the data in a single user interface. …”
Get full text
Get full text
Conference or Workshop Item -
16
A secure trust aware ACO-Based WSN routing protocol for IoT
Published 2022“…To secure IoT networks from routing attacks, a secure trust aware ACO-based WSN routing protocol for IoT is proposed here that establishes secure routing with trustworthy nodes. The trust evaluation system, is enhanced to evaluate the node trust value, identify sensor node misbehavior, and maximize energy conservation. …”
Get full text
Get full text
Get full text
Article -
17
Simulated Kalman Filter algorithms for solving optimization problems
Published 2019“…The proposed population-based SKF algorithm and the single solution-based SKF algorithm use the scalar model of discrete Kalman filter algorithm as the search strategy to overcome these flaws. …”
Get full text
Get full text
Thesis -
18
Sizing optimization of large-scale grid connected photovoltaic system using dolphin echolocation algorithm / Muhammad Zakyizzuddin Rosselan
Published 2018“…Later, an Iterative-based Sizing Algorithm (ISA) was developed to determine the optimal sizing solution which was later used as benchmark for sizing algorithms using optimization methods. …”
Get full text
Get full text
Thesis -
19
Real time self-calibration algorithm of pressure sensor for robotic hand glove system
Published 2019“…This provides a useful methodology for the user to evaluate the performance of any measurement system in a real-time environment.…”
Get full text
Get full text
Thesis -
20
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…The algorithms involved were Genetic Algorithm, Differential Evolution Algorithm, Particle Swarm Optimization, Butterfly Optimization Algorithm, Teaching-Learning-Based Optimization Algorithm, Harmony Search Algorithm and Gravitational Search Algorithm. …”
Get full text
Get full text
Thesis
