Search Results - (( data implication based algorithm ) OR ( java location based algorithm ))

Refine Results
  1. 1
  2. 2

    Group formation using genetic algorithm by Che Ani, Zhamri, Husin, Mohd Zabidin, Yasin, Azman

    Published 2009
    “…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  3. 3

    Multi-floor indoor location estimation system based on wireless local area network by Chua, Tien Han

    Published 2007
    “…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Hybrid DE-PEM algorithm for identification of UAV helicopter by Tijani, Ismaila, Akmeliawati, Rini, Legowo, Ari, Budiyono, Agus, Abdul Muthalif, Asan Gani

    Published 2014
    “…Practical implications – The identification algorithm is expected to facilitate the required model development for model-based control design for autonomous helicopter development. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  8. 8
  9. 9
  10. 10

    Smart agriculture economics and engineering: Unveiling the innovation behind ai-enhanced rice farming by Chuan, Zun Liang, Tham, Ren Sheng, Tan, Chek Cheng, Abraham Lim, Bing Sern, Chong, Yeh Sai

    Published 2025
    “…This article introduced innovative Artificial Intelligence-based (AI-based) predictive algorithms for short-term rice production, utilizing the Cross Industry Standard Process for Data Mining (CRISP-DM) data science framework. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Laptop price prediction using decision tree algorithm / Nurnazifah Abd Mokti by Abd Mokti, Nurnazifah

    Published 2024
    “…The project involves data collection, data preparation, and the implementation of the decision tree algorithm for price prediction. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Agreement options for negotiation on material location decision of housing development by Utomo, C., Rahmawati, Y.

    Published 2020
    “…Social implications: The satisficing algorithm of the coalition will satisfy all stakeholders. …”
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Organizational Culture Automated Audit System (OCAAS) by Al - Jubair, Md. Abdullah

    Published 2017
    “…Several state of the art technologies and techniques were used to design and developed OCAAS which include the use of machine learning and sentiment analysis based novel opinion mining algorithms for electronic opinion analysis and computerized statistics based mathematical algorithms for electronic data analysis as well as MySQL database integration for faster data processing and cognitive ergonomics system interface for user friendly interface navigation.…”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    A Method for Mapping XML DTD to Relational Schemas In The Presence Of Functional Dependencies by Ahmad, Kamsuriah

    Published 2008
    “…To approach the mapping problem, three different components are explored: the mapping algorithm, functional dependency for XML, and implication process. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Algoritma pendaraban nombor perpuluhan dari perspektif pelajar Tingkatan Satu by Md. Yunus, Aida Suraya

    Published 2001
    “…Identification of students' algorithms has implications towards the teaching and learning activities and forms a basis in planning teaching strategies of multiplication involving decimals for mathematics educators.…”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Friendship Degree and Tenth Man Strategy: A new method for differentiating between erroneous readings and true events in wireless sensor networks by Adday, Ghaihab Hassan, Subramaniam, Shamala K., Zukarnain, Zuriati Ahmad, Samian, Normalia

    Published 2023
    “…The second stage will validate the voting process through a novel perspective based on the TMS. TMS will check the voters’ replies based on the event’s location. …”
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Enhancing project completion date prediction using a hybrid model: rule-based algorithm and machine learning algorithm by Abd Rahman, Mohd Shahrizan, Jamaludin, Nor Azliana Akmal, Zainol, Zuraini, Tengku Sembok, Tengku Mohd

    Published 2025
    “…The study employs a hybrid predictive model that combines Big Data technologies, Extract Load Transfer (ELT) processes, rule-based algorithms (RBA), machine learning (ML), and Power BI visualizations. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    A hybrid deep learning-based unsupervised anomaly detection in high dimensional data by Muneer, A., Taib, S.M., Fati, S.M., Balogun, A.O., Aziz, I.A.

    Published 2022
    “…Anomaly detection in high dimensional data is a critical research issue with serious implication in the real-world problems. …”
    Get full text
    Get full text
    Article