Search Results - (( user estimation using algorithm ) OR ( java application using algorithm ))

Refine Results
  1. 1
  2. 2

    Development Of Eye Gaze Estimation System Using Two Cameras by Neoh , Yu Zun

    Published 2017
    “…Current researches uses infrared or LED to locate the iris of the user to have better gaze estimation accuracy compared to researches that does not. …”
    Get full text
    Get full text
    Thesis
  3. 3

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  4. 4
  5. 5

    Particle filter approach for tracking indoor user location using IEEE 802.11 signals by Mantoro, Teddy, Ayu, Media Anugerah, Raman, Shakiratul Husna, Latiff , N. H. M.

    Published 2011
    “…This creates problem in tracking user location indoor. Moreover, the use of light estimation algorithms such as fingerprinting, ranking algorithm, Weighted Centroid method, k-Nearest Neighbour, did not give a good tracking result. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Estimating Depressive Tendencies Of Twitter User Via Social Media Data by Loh, Hooi Teng

    Published 2023
    “…We will use these three machine learning algorithms to compare the accuracy and performance of the depressed twitter user. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  8. 8

    Estimation in spot welding parameters using genetic algorithm by Lukman, Hafizi

    Published 2007
    “…By using Genetic algorithm (GA) the spot welding parameters can be estimated.…”
    Get full text
    Get full text
    Thesis
  9. 9

    Indoor location estimation utilizing Wi-Fi Signals by Hashim, Nik Mohd Zarifie, Zahari, Muhammad Khairul, Ja'afar, Abd Shukur, Salleh, Azahari, Darsono, Abd Majid

    Published 2020
    “…The study aim is to develop positioning and localization systems by using Wi-Fi signal. Estimation was made based on the measurement of wireless distance for estimation the user’s coordinates. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Trajectory planning and simulation for 3d printing process by Ng, Chin Yong

    Published 2022
    “…The output of slicing algorithm will be used as input of infill generator to generate infill vertices based on the infill density and infill pattern that decided by users. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11

    Performance evaluation of multi-user detection in Cdma using micro-genetic algorithm by Ahmad, Azmi, Ali, Borhanuddin M., Khatun, Sabira, Hassan, Azmi

    Published 2005
    “…While near-far effect problem can be approach by applying power control, the MAI problem requires individual receiver to identify desired signal from interferences thus making multi-user detector a popular area of research. Genetic Algorithms (GA) is a search and optimizes technique that works by estimating multiple solutions in order to come with the best estimated solution. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12
  13. 13

    Reduced-rank technique for joint channel estimation in TD-SCDMA systems. by Ismail, Alyani, Sali, Aduwati, Mohd Ali, Borhanuddin, Khatun, Sabira

    Published 2013
    “…The adopted reduced rank technique is based on singular value decomposition algorithm. Equations for reduced rank-joint channel estimation (JCE) are derived and compared against traditional full rank-joint channel estimators: least square (LS) or Steiner, enhanced LS, and minimum mean square error algorithms. …”
    Get full text
    Get full text
    Article
  14. 14

    Reduced rank technique for joint channel estimation and joint data detection in TD-SCDMA systems by Marzook, Ali Kamil, Ismail, Alyani, Mohd Ali, Borhanuddin, Sali, Aduwati, Khalaf, Mohannad H., Khatun, Sabira

    Published 2013
    “…The adopted reduced rank technique is based on singular value decomposition algorithm. Equations for reduced rank-joint channel estimation (JCE) are derived and compared against traditional full rank-joint channel estimators: least square (LS) or Steiner, enhanced LS, and minimum mean square error algorithms. …”
    Get full text
    Get full text
    Article
  15. 15

    Multi-observers of particle filter approach for estimating indoor mobile user location by Mantoro, Teddy, Ayu, Media Anugerah, Usino, Wendi, Raman, Shakiratul Husna, Md Latiff, Nurul Hidayati

    Published 2011
    “…Location-aware personal computing application can work accurately by estimating user location using IEEE 802.11 (Wi-Fi) signals in indoor environment. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  16. 16

    Reduced Rank Technique for Joint Channel Estimation and Joint Data Detection in TD-SCDMA Systems by Sabira, Khatun, Ali K., Marzook, Alyani, Ismail, Aduwati, Sali, Mohannad Hamed, Khalaf, Borhan, M. Ali

    Published 2012
    “…The adopted reduced rank technique is based on singular value decomposition algorithm. Equations for reduced rank-joint channel estimation (JCE) are derived and compared against traditional full rank-joint channel estimators: least square (LS) or Steiner, enhanced LS, and minimum mean square error algorithms. …”
    Get full text
    Get full text
    Article
  17. 17

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19

    Age detection from face using Convolutional Neural Network (CNN) / Hanin Hanisah Usok @ Yusoff by Usok @ Yusoff, Hanin Hanisah

    Published 2024
    “…The capacity to reliably estimate a person's age using facial traits is critical in improving user experiences and security processes. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Factors influencing graphical user algorithm for mobile banking user authentication: a systematic literature review by Ugochukwu, Ejike Ekeke Kingsley, Jusoh, Yusmadi Yah

    Published 2014
    “…With the increasing number of mobile users, which currently is estimated to be about 500million users by 2015 according to a study done by the Yankee Group in 2011, the main objective of this study is to review studies on mobile banking usability factors and graphical user authentication algorithms on the suitable algorithm to be adopted for mobile banking user authentication. …”
    Get full text
    Get full text
    Get full text
    Article