Search Results - (( mobile extraction method algorithm ) OR ( using optimization method algorithm ))
Search alternatives:
- mobile extraction »
- extraction method »
- method algorithm »
-
1
Behavioural Feature Extraction For Context-Aware Traffic Classification Of Mobile Applications
Published 2018“…This thesis identified domain-specific features that are effective for accurate, large-scale and scalable mobile applications classification using machine learning techniques. This thesis designed a context-aware traffic classification framework that includes a set of sequential algorithms from cleaning datasets, to identifying new features and detecting optimal classifier(s) based on problem contexts to improve classification accuracy in multi-variate traffic classification.…”
Get full text
Get full text
Thesis -
2
Color Image Segmentation Based on Bayesian Theorem for Mobile Robot Navigation
Published 2009“…Experimental results show that the proposed algorithm works better than other two methods in terms of classifier accuracy with result of more than 99 percent successful segmentation of desired color in varying illumination. …”
Get full text
Get full text
Thesis -
3
Improved Malware detection model with Apriori Association rule and particle swarm optimization
Published 2019“…These rule models are used together with extraction algorithm to classify and detect malicious android application. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
4
Task offloading paradigm in mobile edge computing-current issues, adopted approaches, and future directions
Published 2023“…For each journal paper, the detailed information of the work area, targeted issue, formulation technique, optimization approach, adopted algorithms, evaluation techniques, performance matrices, dataset, utilized tools, and framework are extracted and analyzed using manual and automatic coding. …”
Get full text
Get full text
Article -
5
The classification of wink-based eeg signals by means of transfer learning models
Published 2021“…The implementation of pre-processing algorithms has been demonstrated to be able to mitigate the signal noises that arises from the winking signals without the need for the use signal filtering algorithms. …”
Get full text
Get full text
Thesis -
6
Optimising acoustic features for source mobile device identification using spectral analysis techniques / Mehdi Jahanirad
Published 2016“…Hence, addressing robust feature extraction methods for source communication device identification is necessary. …”
Get full text
Get full text
Thesis -
7
Framework for pedestrian walking behaviour recognition to minimize road accident
Published 2021“…The results indicate the following: (1) From 262 samples, 66.80% and 48.10% of respondents use mobile phones for calling and chatting, respectively. (2) 263 samples of participants are obtained and analysed, and 90 features are extracted from each sample. (3) 100% classification accuracy are obtained for each class (normal walking, calling, chatting, and running) using the grid optimiser method in machine learning. (4) The precision of classification using Euclidean algorithm for normal walking and calling is 70%. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Framework for pedestrian walking behaviour recognition to minimize road accident
Published 2021“…The results indicate the following: (1) From 262 samples, 66.80% and 48.10% of respondents use mobile phones for calling and chatting, respectively. (2) 263 samples of participants are obtained and analysed, and 90 features are extracted from each sample. (3) 100% classification accuracy are obtained for each class (normal walking, calling, chatting, and running) using the grid optimiser method in machine learning. (4) The precision of classification using Euclidean algorithm for normal walking and calling is 70%. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Geometric-RANSAC position estimation method for enhanced indoor positioning using multipath signals for single base station systems
Published 2025“…The method considers the formation of a virtual multiple BS system model by treating each of the multipath components received at a mobile station (MS) position as a signal transmitted by a virtual BS. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Hybrid indoor positioning utilizing multipath- assisted fingerprint and geometric estimation for single base station systems
Published 2025“…In the position estimation phase, a novel Geometric Random Sample Consensus (Geometric-RANSAC) multilateration method is proposed by optimizing the MS position estimate over several potential position estimates calculated using regional 3D geometric equations. …”
Get full text
Get full text
Get full text
Thesis -
11
Data mining in mobile ECG based biometric identification
Published 2014“…Subjects in MIT-BIH Normal Sinus Rhythm Database (NSRDB) were used to validate the reliability and stability of the subject recognition methods. Discriminatory features extracted from the experimentation were later applied to different classifiers for performance measures based on the complexity of our proposed sample extraction method when compared to other related algorithms, the total execution time (TET) applied on different classifiers in various mobile devices and the classification accuracies when applied to various classification techniques. …”
Get full text
Get full text
Get full text
Article -
12
Extracting crown morphology with a low-cost mobile LiDAR scanning system in the natural environment
Published 2021“…Finally, morphological parameters of the canopy, such as crown height, crown diameter, and crown volume, are extracted using statistical and voxel methods. To verify the algorithm, a total of 43 trees in multiple plots of the campus were tested and compared. …”
Get full text
Get full text
Get full text
Article -
13
Overhead vision system for mobile robot orientation detection
Published 2011“…Cameras are used to capture the images of mobile robot at various orientations. The images are preprocessed and important features are extracted to be used in the proposed methods. …”
Get full text
Thesis -
14
Application of genetic algorithm methods to optimize flowshop sequencing problem
Published 2008“…Genetic algorithm method was one of the methods that were widely used in solving optimization problem. …”
Get full text
Get full text
Undergraduates Project Papers -
15
Sizing optimization of large-scale grid connected photovoltaic system using dolphin echolocation algorithm / Muhammad Zakyizzuddin Rosselan
Published 2018“…Later, an Iterative-based Sizing Algorithm (ISA) was developed to determine the optimal sizing solution which was later used as benchmark for sizing algorithms using optimization methods. …”
Get full text
Get full text
Thesis -
16
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…Moreover, Butterfly Optimization Algorithm and Harmony Search Algorithm were combined as optimization method led to a new method named BOAHS. …”
Get full text
Get full text
Thesis -
17
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…Power consumption is one major constraint that makes traditional detection methods impractical for mobile devices, while cloud-based techniques raise many privacy concerns. …”
Get full text
Get full text
Get full text
Thesis -
18
Reduced Set Kernel Principal Component Analysis (Rskpca) Algorithm for Palm Print Based Mobile Biometric System
Published 2015“…In this project, it has been proven that the proposed RSKPCA as feature extraction gives the best result for mobile biometric system based on palm print. …”
Get full text
Get full text
Thesis -
19
Designing an expressive virtual Kompang on mobile device with tri-axial accelerometer
Published 2018“…This paper is therefore implemented a simple extraction method by extracting percussive features from embedded sensors to map with the output sound with minimum delay. …”
Get full text
Get full text
Get full text
Article -
20
Wind farm reactive power optimization by using imperialist competitive algorithm
Published 2013“…In this paper a new evolutionary computing method based on imperialist competitive algorithm (ICA) is used for optimization of the reactive power in a wind farm. …”
Get full text
Get full text
Conference or Workshop Item
