Search Results - (( based constructive method algorithm ) OR ( using mobile method algorithm ))

Refine Results
  1. 1

    A generalized laser simulator algorithm for optimal path planning in constraints environment by Aisha, Muhammad

    Published 2022
    “…A statistical test was used to demonstrate the efficiency of the proposed algorithm over the compared methods. …”
    Get full text
    Thesis
  2. 2
  3. 3

    Mobile robot positioning system by Khairulnizam Othman

    Published 2008
    “…Using these 4 Wheels drive, the Mobile Robots positioning provide 2 Degree of Freedom (DOF) for the mobility. …”
    Get full text
    Learning Object
  4. 4

    k- Nearest Neighbor Algorithm For Improving Accuracy In Clutter Based Location Estimation Of Wireless Nodes by Muhammad Mansoor Alam, Mazliham Mohd Su'ud, Patrice Boursier, Shahrulniza Musa

    Published 2013
    “…This research is focusing on the precise location estimation of mobile node by using k - nearest neighbor algorithm (k-NN). …”
  5. 5

    Amtree Protocol Enhancement by Multicast Tree Modification and Incorporation of Multiple Sources by Al‐Sharafi, Ali Mohammed Ali

    Published 2008
    “…The results from experiments show that handoff latency using the new algorithms is much lower than using AMTree handoff procedure in both cases, i.e. when the source connects to a subscribed base station or not subscribed base station. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Wi-Fi signal strengths database construction for indoor positioning systems using Wi-Fi RFID by Narzullaev, Anvar, Selamat, Mohd Hasan

    Published 2013
    “…Compared to existing calibration procedure our method requires only few signal samples from RFID tags to be collected and rest of the database is recovered using path-loss prediction algorithm.…”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Wifi positioning system / Amalina Abdul Halim by Abdul Halim, Amalina

    Published 2006
    “…During data collection, empirical model method is used in order to construct the reference table. …”
    Get full text
    Student Project
  8. 8

    Stress mental health symptom assessment mobile application for young adults by Lee, Chun Hoong

    Published 2023
    “…As for the panic attack prediction feature, the application will transmit user-input responses to a model previously trained using historical data. Before this stage, the KNN algorithm is employed to construct the model using Google Form response data as part of the application development process. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9

    A framework of modified adaptive neuro-fuzzy inference engine by Hossen, Md. Jakir

    Published 2012
    “…The Takagi-Sugeno-Kang (TSK) type fuzzy inference system was chosen and constructed by an automatic generation of clusters as well as membership functions and minimal rules through the use of hybrid fuzzy clustering and the modified apriori algorithms respectively. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Internet of things (IoT) based grid tension monitoring system by Lina Khalida, Norazmi

    Published 2022
    “…The Internet of things method use in this monitoring system is by using ThingSpeak web and Blynk application. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  11. 11

    DurianCare: optimising trunk disease detection and precision farming in a mobile application / Muhammad Haziq Azmi by Azmi, Muhammad Haziq

    Published 2025
    “…In this project we do propose a construction of “DurianCare”, a mobile application that able to utilize techniques of Convolutional Neural Networks (CNN), Precision Agriculture, and Content Based Filtering for enhancing the farming practices of sustaining crops by advanced disease detection and the guided recommendation. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Speaker identification through feature fusion based deep learning / Rashid Jahangir by Rashid , Jahangir

    Published 2021
    “…These unique characteristics enable researchers to recognise human voice using artificial intelligence techniques that are important in the areas of security and surveillance, electronic voice eavesdropping, mobile banking, mobile shopping and speaker identification (SI). …”
    Get full text
    Get full text
    Thesis
  13. 13

    Reduced rank technique for joint channel estimation and joint data detection in TD-SCDMA systems by Marzook, Ali Kamil

    Published 2013
    “…The adopted reduced rank technique is based on Singular Value Decomposition (SVD). The proposed method has declared the superiority over the conventional methods that are being used in the current applications of TD-SCDMA systems. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Hybrid indoor positioning utilizing multipath- assisted fingerprint and geometric estimation for single base station systems by Manap, Zahariah

    Published 2025
    “…The proposed method leverages room geometry and takes advantage of the multipath signal propagation to construct multiple virtual base station system model. …”
    Get full text
    Get full text
    Thesis
  15. 15

    An efficient up-link load reduction model based on clustering in vanets by Abbas Al-Sallami, Ali Hashim

    Published 2019
    “…The DMA method filtered the CHs information by sending only new information to the BS; therefore, this method helped to reduce the load at BSs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim by Ibrahim, Mohd Faisal

    Published 2017
    “…The results showed that the decision algorithm improves the measurement by 28% and the degraded transcoded video does not affect students' comprehension.…”
    Get full text
    Get full text
    Thesis
  17. 17

    Development of new code for optical code division multiple access systems by Hilal Adnan, Fadhil

    Published 2011
    “…Firstly, a comprehensive discussion takes place on all important aspects of existing codes from advantages and disadvantages point of view. Splitting algorithm is proposed to construct the new code families namely RD code. …”
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…It should be analyzed by using a more reliable method such as a malware analyzer. …”
    Get full text
    Get full text
    Thesis