Search Results - (( (evolution OR solution) location detection algorithm ) OR ( java application using algorithm ))

Refine Results
  1. 1

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  2. 2

    Collaborative Location-Based Mobile Game with Error Detection Algorithm by Adrus, Mohamad Tazuddin, Wong, Ming Ming, Abang Mohamad Aizuddin, Abang Mohd Mohtar

    Published 2018
    “…The game takes advantage of the weakness of Wi-Fi localization where environmental influence is significant and makes it part of the gameplay. A simple error detection algorithm is also introduced to maximize the game playability value by balancing game responsiveness and accuracy level.…”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation by Ahmadipour, Masoud

    Published 2019
    “…In order to train Ridgelet probabilistic neural network, a modified differential evolution algorithm with new mutation phase, crossover process, and selection mechanism is introduced. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A review on object detection algorithms based deep learning methods / Wan Xing ... [et al.] by Wan Xing, Sultan Mohd, Mohd Rizman, Johari, Juliana, Ahmat Ruslan, Fazlina

    Published 2023
    “…Deep learning-based object detection algorithms can be categorized into three main types: end-to-end algorithms, two-stage algorithms, and one-stage algorithms. …”
    Get full text
    Get full text
    Article
  5. 5

    Evolution strategy for collaborative beamforming in wireless sensor networks by Wong, Chen How

    Published 2013
    “…It becomes a vital problem to achieve CB as the distributed sensor nodes are unaware of their phase relationship. An iterative algorithm using evolution strategy (ES) is proposed to achieve phase alignment at the intended location in static channels, which require one-bit feedback from the receiver destination. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    A New Approach of Optimal Search Solution in Particle Swarm Optimization (PSO) Algorithm for Object Detection Method by Zalili, Musa, Mohd Hafiz, Mohd Hassin, Nurul Izzatie Husna, Fauzi, Rohani, Abu Bakar, Watada, Junzo

    Published 2018
    “…Therefore, to overcome the several problems associated with the object detection method, a new approach in Particle Swarm Optimization (PSO) algorithm for optimal search solution as an alternative method to detect of object tracking quickly, precisely and accurately. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    An Adaptive Switching Cooperative Source Searching And Tracing Algorithms For Underwater Acoustic Source Localization by Majid, Mad Helmi Ab.

    Published 2019
    “…In a source searching task, two possible scenarios can occur: source detected and source not detected. In this study, a complete solution to the two scenarios through an adaptive algorithm switching strategy is explored. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar by Seyed Alireza, Ravanfar

    Published 2017
    “…Therefore, a new reference-free damage detection algorithm is proposed. The RWPE measurements of different sensor-to-sensor pairs are applied for defining the reference-free damage index (RDI) of each sensor location. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  10. 10
  11. 11
  12. 12

    A Reference Based Surface Defect Segmentation Algorithm For Automatic Optical Inspection System by Wong, Ze-Hao

    Published 2020
    “…Surface defect segmentation algorithms in Automatic Optical Inspection (AOI) system for modern manufacturing industries provide solutions to quality control with speed, volume and traceability. …”
    Get full text
    Get full text
    Thesis
  13. 13

    From sensing to predictions and database technique: a review of TV white space information acquisition in cognitive radio networks by Anabi, Hilary K., Nordin, Rosdiadee, Abdulghafoor, Omar B., Sali, Aduwati, Mohamedou, Ahmed, Almqdshi, Abdulmajid, Abdullah, Nor Fadzillah

    Published 2017
    “…Strategies to acquire white space information is the single most significant functionality in cognitive radio networks (CRNs) and as such, it has gone some evolution to enhance information accuracy. The evolution trends are spectrum sensing, prediction algorithm and recently, geo-location database technique. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Power line corridor vegetation encroachment detection from satellite images using retinanet and support vector machine by Fathi Mahdi Elsiddig Haroun, Mr.

    Published 2023
    “…Several studies have provided solutions for detecting vegetation encroachment based on satellite images. …”
    text::Thesis
  15. 15

    Fraud detection in shipping industry based on location using machine learning comparison techniques by Ganesan Subramaniam, Mr.

    Published 2023
    “…However, the challenge in data-driven detection is its effectiveness is often detection accuracy and the speed of detection. …”
    text::Thesis
  16. 16

    Vision Based Calibration and Localization Technique for Video Sensor Networks by Mohamed Sharif, Sharif Amar Mohamed Sharif

    Published 2009
    “…The recent evolutions in embedded systems have now made the video sensor networks a reality. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Optimal distributed generation and load shedding scheme using artificial bee colony- hill climbing algorithm considering voltage stability and losses indices by Ali Abdallah, Ali Emhemed

    Published 2021
    “…To solve this problem, an optimal load shedding approach, integrated with optimal DG sizing is proposed using the ABC-HC algorithm. This technique can find the load location to be shed, as well as the size of DG. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Evoluation strategy for collaborative beamforming in wireless sensor networks by Wong, Chen How

    Published 2013
    “…It becomes a vital problem to achieve CB as the distributed sensor nodes are unaware of their phase relationship. An iterative algorithm using evolution strategy (ES) is proposed to achieve phase alignment at the intended location in static channels, which require one-bit feedback from the receiver destination. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Using electromechanical impedance and extreme learning machine to detect and locate damage in structures by Djemana, Mohamed, Hrairi, Meftah, Al Jeroudi, Yazan

    Published 2017
    “…In particular, electromechanical impedance (EMI) techniques give simple and low cost solutions for detecting damage in different structures. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article