Search Results - (( basic complex data algorithm ) OR ( java location based algorithm ))

Refine Results
  1. 1

    Voting algorithms for large scale fault-tolerant systems by Karimi, Abbas

    Published 2011
    “…By extracting various plots from different aspects, we demonstrated that, compared to the basic algorithm, our algorithm has higher reliability and availability as the quantity of the input data increases. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Group formation using genetic algorithm by Che Ani, Zhamri, Husin, Mohd Zabidin, Yasin, Azman

    Published 2009
    “…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  4. 4

    Multi-floor indoor location estimation system based on wireless local area network by Chua, Tien Han

    Published 2007
    “…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7
  8. 8

    A real-time vision-based touchless interaction of virtual heart using integration of motion gesture interaction methods by Ng, Ing Kye

    Published 2014
    “…Third, the range which is defined as left or right is used for gesture recognition. Lastly, the basic transformation such as rotation, translation and scale is executed if a data motion lies within the range. …”
    Get full text
    Get full text
    Academic Exercise
  9. 9

    CHAOS BASED BLOCK ENCRYPTOR by SARIN, FARHANA

    Published 2008
    “…This project is basically a block encryption to protect block of data. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    Accelerating graph algorithms with priority queue processor by Heng Sun, Ch'ng, Eik Wee, Chew, Shaikh-Husin, Nasir, Hani, Mohamed Khalil

    Published 2006
    “…Many graph algorithms are organized as simple elaborations of basic graph searching algorithms. …”
    Get full text
    Get full text
    Article
  11. 11

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    A highly efficient algorithm for phased-array mmWave massive MIMO beamforming by Althuwayb, Ayman Abdulhadi, Hashim, Fazirulhisyam, Liew, Jiun Terng, Khan, Imran, Jeong, Woo Lee, Affum, Emmanuel Ampoma, Ouahabi, Abdeldjalil, Jacques, Sébastien

    Published 2021
    “…Simulation results show that the proposed algorithm significantly improves system performance and reduces computational complexity by more than 45% compared to traditional algorithms.…”
    Get full text
    Get full text
    Article
  13. 13

    Recursive Subspace Identification Algorithm Using The Propagator Based Method by Jamaludin, Irma Wani, Abdul Wahab, Norhaliza

    Published 2017
    “…However, because of the SVD computational complexity that involved in the algorithm, the classical SMI algorithms are not suitable for online application. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Dynamic Feedback Flow Control Algorithms for Unicast and Multicast Available Bit Rate Service in Asynchronous Transfer Mode Networks by Abdelrahman, Ali Mohamed

    Published 2000
    “…The rest may be implemented with additional complexity. Secondly, the research shifts to the problems of point-to-multipoint algorithms by introducing the basic concept of multicasting ABR servIce and reviewing a group of consolidation schemes, where the compromise between low consolidation nOlse and fast transient response is the main issue. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  16. 16
  17. 17

    Fuzzy parameterized complex multi-fuzzy soft expert set theory and its application in decision-making by Al-Qudah, Yousef Ali Abed, Hassan, Mazlan, Hassan, Nasruddin

    Published 2019
    “…A recent focus has been the analysis of a complex data set using the properties of fuzzy concept lattice and the complex soft set. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Projected majorized-correlation technique for noise filtering and accuracy in orthogonal frequency division multiplexing by Alsaadi, Alaa Abdullah Mohammed

    Published 2020
    “…PQMCC technique is proposed to reduce the power of noise in OFDM signal, arise the accuracy of received signal and decrease the complexity. Precisely, by proposing the projected signal (py>) in PQMCC technique has solved the three main issues: power of noise, accuracy in received random signal (y>) and complexity in Tight Quadratic Majorization algorithm (TQM) for Phase Noise Estimation Technique. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory by Rusli, Julie Roslita

    Published 2011
    “…A user-friendly Graphical User Interface (GUI) is developed using Microsoft Visual Basic software to load and display the algorithm under test and display the result. …”
    Get full text
    Get full text
    Thesis