Search Results - (( code application during algorithm ) OR ( java location based algorithm ))
Search alternatives:
- application during »
- code application »
- during algorithm »
- java »
-
1
-
2
Group formation using genetic algorithm
Published 2009“…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
3
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
Get full text
Get full text
Thesis -
4
A study on channel coding for 5G / Xu Wei
Published 2019Get full text
Get full text
Get full text
Thesis -
5
-
6
-
7
-
8
-
9
Enhanced algorithms for three-dimensional object interpreter
Published 2004Get full text
Get full text
Get full text
Thesis -
10
Development of a scalable video compression algorithm
Published 2012“…It is known that conventional video coding systems encode video content with given bitrates adapted to a specific function or application. …”
Get full text
Get full text
Get full text
Proceeding Paper -
11
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
-
13
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
Get full text
Get full text
Get full text
Academic Exercise -
14
Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing
Published 2023“…We utilized the enhanced Q-Learning algorithm to compare actions, including context-based actions, to effectively achieve higher code coverage. …”
Get full text
Get full text
Get full text
Thesis -
15
-
16
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…Few approaches have focused on removing the vulnerabilities from the source codes before deployment of the applications. The presence of XSS vulnerabilities in an application makes it easy to attack successfully during runtime. …”
Get full text
Get full text
Thesis -
17
REGION-BASED ADAPTIVE DISTRIBUTED VIDEO CODING CODEC
Published 2011“…The recently developed Distributed Video Coding (DVC) is typically suitable for the applications where the conventional video coding is not feasible because of its inherent high-complexity encoding. …”
Get full text
Get full text
Thesis -
18
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…Some applications, such as Message Authentication Code (MAC), rely on different hashing operations. …”
Get full text
Get full text
Get full text
Article -
19
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…Some applications, such as Message Authentication Code (MAC), rely on different hashing operations. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Efficient DNS based Load Balancing for Bursty Web Application Traffic
Published 2012“…Owing to the existing load balancing algorithms still experience server’s resource congestion and slow connection to the system resulted by sudden bursty demand of services especially during special events. …”
Get full text
Get full text
Get full text
Article
