Search Results - (( basic complex based algorithm ) OR ( java location based algorithm ))

Refine Results
  1. 1
  2. 2

    Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence by S. S. S. , Ranjit

    Published 2011
    “…Basically, the proposed of FUHS16, UHDS16 and UHDS8 algorithm produces the best motion vector estimation finding based on the block-based matching criteria. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  3. 3

    Voting algorithms for large scale fault-tolerant systems by Karimi, Abbas

    Published 2011
    “…Among basic voting algorithms, average voter and weighted average voter have higher availability but unfortunately they have higher time and calculation complexity in large scale systems. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Group formation using genetic algorithm by Che Ani, Zhamri, Husin, Mohd Zabidin, Yasin, Azman

    Published 2009
    “…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  5. 5

    Multi-floor indoor location estimation system based on wireless local area network by Chua, Tien Han

    Published 2007
    “…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

    IMPLEMENTATION OF BEHAVIOUR BASED NAVIGATION IN A PHYSICALLY CONFINED SITE by ABDUL RAZAK, NUSRAH

    Published 2017
    “…Selected basic behaviour-based algorithms such as wallfollower, obstacle avoidance, escape route and target detection are to be combined and its efficiency is measured. …”
    Get full text
    Get full text
    Final Year Project
  12. 12

    Recursive Subspace Identification Algorithm Using The Propagator Based Method by Jamaludin, Irma Wani, Abdul Wahab, Norhaliza

    Published 2017
    “…However, because of the SVD computational complexity that involved in the algorithm, the classical SMI algorithms are not suitable for online application. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    A New Visual Public-Key Cryptosystem Based On Non-Expansion Technique And Boolean Operations by Jaafar, Abdullah Mohammed Abdo Ali

    Published 2011
    “…However, most of the existing public-key algorithms are based on complex mathematical computations. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    An algorithm for the selection of planting lining technique towards optimizing land area: an algorithm for planting lining technique selection by Md Badarudin, Ismadi, Md Sultan, Abu Bakar, Sulaiman, Md. Nasir, Mamat, Ali, Tengku Muda Mohamed, Mahmud

    Published 2012
    “…The algorithm is designed based on two basic works in which to calculate number of trees and divide an area into blocks. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  19. 19

    Hexagon pattern particle swarm optimization based block matching algorithm for motion estimation / Siti Eshah Che Osman by Che Osman, Siti Eshah

    Published 2019
    “…Due to the center biased nature of the videos, the HPSO algorithm uses an initial pattern (hexagon-shaped) to speed up the convergence of the algorithm. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…On the other hand, agent-based model offers a good method to solve complex computational problems. …”
    Get full text
    Get full text
    Thesis