Search Results - (( user identification using algorithm ) OR ( basic optimization sensor algorithm ))
Search alternatives:
- identification using »
- user identification »
- optimization sensor »
- basic optimization »
- sensor algorithm »
- using algorithm »
-
1
On Clustering Algorithm Of Coverage Area Problems In Wireless Sensor Networks
Published 2024“…For the proliferation of wireless sensor network, in different environments, an escalation in the lifetime of wireless sensors is mandatory, because among the basic issues concerning WSN is a successful effort to document the coverage of the number of target fields, while maximizing the lifetime of this network. …”
Article -
2
Development an accurate and stable range-free localization scheme for anisotropic wireless sensor networks
Published 2022“…This study developed an optimized variation of the DV-Hop localization algorithm for anisotropic wireless sensor networks. …”
Get full text
Get full text
Thesis -
3
Efficient transmission based on genetic evolutionary algorithm
Published 2022“…In this paper, an energy-saving mechanism based on genetic algorithm in wireless sensor network (WSN) is proposed. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
4
Effective predicate identification algorithm for XML retrieval
Published 2018“…Finally, an effective predicate identification algorithm (EPIA) which uses EBQS and STPS to return relevant predicates is introduced. …”
Get full text
Get full text
Conference or Workshop Item -
5
Even-odd scheduling based energy efficient routing for wireless sensor network (WSN) / Muhammad Zafar Iqbal Khan
Published 2022“…Wireless Sensor Network (WSN) is basically composed of battery powered devices which have an obvious limitation of energy on sensors nodes, so it is the foremost motivation to develop a method to save energy of wireless sensor networks where networks are kept alive for a long time. …”
Get full text
Get full text
Thesis -
6
A Survey Of Supervised Machine Learning In Wireless Sensor Network: A Power Management Perspective
Published 2013“…This survey paper is focused on the discussion of best optimal path routing algorithms in wireless sensor networks by using supervised machine learning approaches. …”
Get full text
Get full text
Conference or Workshop Item -
7
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
Get full text
Get full text
Get full text
Thesis -
8
-
9
Eeg-Based Person Identification Using Multi-Levelwavelet Decomposition With Multi-Objective Flower Pollination Algorithm
Published 2020“…For addressing these points, a novel person identification method that is using EEG with multi-level wavelet decomposition and multi-objective flower pollination algorithm is proposed in this thesis. …”
Get full text
Get full text
Thesis -
10
Effects of user selected conditions on modeling of dynamic systems using adaptive fuzzy model
Published 2001“…The implementation and the computational aspects of the training algorithm are also highlighted. Three examples of discrete-time nonlinear systems are used in the simulation study to show the effects of user selected conditions on the identification process. …”
Get full text
Get full text
Get full text
Article -
11
An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias
Published 2017“…Android smartphone is used in order to test this algorithm.…”
Get full text
Get full text
Thesis -
12
Modeling and control of a Pico-satellite attitude using Fuzzy Logic Controller
Published 2010“…The performances obtained show that the optimized APFLC is better than the non-optimize APFLC in terms of RMSE and the settling time.…”
Get full text
Thesis -
13
Smart cards and the fingerprint: a framework for user identification and authentication
Published 2003“…As a result, the research proposed a framework for user identification and authentication in automatic-teller-machine (ATM) systems using fingerprints and smart cards as opposed to the PIN and magnetic-stripe cards.…”
Get full text
Get full text
Get full text
Article -
14
Tag clouds algorithm with the inclusion of personality traits
Published 2015“…This algorithm is beneficial for decision making using information visualization in which personality traits of the user are heavily inclined. …”
Get full text
Get full text
Get full text
Thesis -
15
Identifying the influential spreaders in multilayer interactions of online social networks
Published 2016“…The measurement results are found to be more reliable when the identification algorithms are applied to proposed topological representation compared when these algorithms are applied to single layer representations.…”
Get full text
Get full text
Article -
16
Online fingerprint recognition
Published 2010“…Fingerprints are the most popularly used in biometric identification and recognition systems, because they can be easily used and their features are highly reliable. …”
Get full text
Get full text
Undergraduates Project Papers -
17
Fault Detection and Identification in Quadrotor System (Quadrotor Robot)
Published 2016“…This Artificial Neural Network (ANN) is an algorithm that is used to determine the type of fault and the severity level as well as isolate the fault from the system. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
DEVELOPMENT OF IRIS RECOGNITION SYSTEM
Published 2016“…This project implements an iris recognition algorithm as a biometric identification. There is a need for reliable and security identification since typical identification methods using identity cards, passwords, and user name possess threats to the security of an organization because of human error. …”
Get full text
Get full text
Final Year Project -
19
An efficient fuzzy clustering algorithm for mining user session clusters on web log data
Published 2021“…Client access patterns can be mined from web access log information using Web Usage Mining (WUM) techniques. Because there are so many end-user sessions and URL resources, the size of web user session data is enormous. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
A graphical user interface application for continuous-time identification of dynamical system
Published 2002“…This paper introduces a Graphical User Interface (GUI) application in system identification and parameter estimation of dynamic systems using Generalized Poisson Moment Functionals (GPMF) method based on Instrumental Variable (IV) algorithm. …”
Get full text
Get full text
Get full text
Article
