Search Results - (( affecting implementation some algorithm ) OR ( java location based algorithm ))
Search alternatives:
- affecting implementation »
- implementation some »
- some algorithm »
- java »
-
1
-
2
Group formation using genetic algorithm
Published 2009“…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
3
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
Get full text
Get full text
Thesis -
4
-
5
VITILIGO LESION ASSESSMENT TOOL ON SMARTPHONE
Published 2013“…In some European countries skin diseases affect around 60 percent of the population [15]. …”
Get full text
Get full text
Final Year Project -
6
Attribute related methods for improvement of ID3 Algorithm in classification of data: A review
Published 2020“…Nevertheless, there are some limitations in ID3 algorithm that can affect the performance in the classification of data. …”
Get full text
Get full text
Get full text
Article -
7
Outdoor marker-less tracking and pose calculating system for mobile augmented reality
Published 2014“…While some adopt client server architecture for marker-less tracking which is adversely affected by network latency. …”
Get full text
Get full text
Thesis -
8
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
Get full text
Get full text
Get full text
Academic Exercise -
10
Amplitude independent muscle activity detection algorithm of soft robotic glove system for hemiparesis stroke patients using single sEMG channel
Published 2020“…To simplify soft robotic glove systems and make them more practical for use in daily basis, they should have minimum number of sEMG channels. In spite of some algorithms that have been developed in the literature to classify some hand motions by using single channel, the current implementation of soft robotic glove systems are still employing two channels for detecting the closing and opening movements of the hand, due to the intensive calculations required by these algorithms which impose difficulties on real time implementation. …”
Get full text
Get full text
Thesis -
11
Token based path allocation approach for mobile robots in sorting centre for achieving high throughput
Published 2024“…This project proposes an improved path-finding algorithm that implements token-based path finding while a robot wants to access a grid cell. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Development of heuristic task scheduling algorithm in cloud computing
Published 2016“…The proposed algorithm is followed by a discussion in order to make smoother the implementation. …”
Get full text
Get full text
Proceeding Paper -
13
Architectural review of load balancing single system image
Published 2008“…Result: This study will review some of the most popular architecture and algorithms used in load balancing single system image. …”
Get full text
Get full text
Article -
14
A semi-synchronous label propagation algorithm with constraints for community detection in complex networks
Published 2017“…Despite this advantage in computational time, the performance of LPA is affected by randomness in the algorithm. A modified LPA, called CLPA-GNR, was proposed recently and it succeeded in handling the randomness issues in the LPA. …”
Get full text
Get full text
Article -
15
Traffic management algorithms for LEO satellite networks
Published 2016“…Those two algorithms are combined together due to the strong possibilities of being unable to achieve the optimal results when implemented separately. …”
Get full text
Get full text
Get full text
Thesis -
16
Improved flower pollination optimization algorithm based on swap operator and dynamic switch probability selection
Published 2023“…These algorithms belong to stochastic and nondeterministic classes, have some problems with exploration or exploitation. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
The effect of job satisfaction on the relationship between organizational culture and organizational performance
Published 2023“…These algorithms belong to stochastic and nondeterministic classes, have some problems with exploration or exploitation. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
A secure, anonymous and verifiable E-Voting system
Published 2020“…Furthermore, this paper also proposes a more secure voting system which uses some encryption and hashing algorithms in order to solve the negative impacts of the existing voting systems. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
Published 2018“…Similarly, the key space should be disproportionately large to resist any attack on the secret key. To archive that, some algorithms adopt the use of matrixes such as quasigroup, Hybrid cubes and substitution box (S-box) to generate the encryption keys. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Friendship Degree and Tenth Man Strategy: A new method for differentiating between erroneous readings and true events in wireless sensor networks
Published 2023“…The second stage will validate the voting process through a novel perspective based on the TMS. TMS will check the voters’ replies based on the event’s location. …”
Get full text
Get full text
Article
