Search Results - (( developing interactive usage algorithm ) OR ( java location based algorithm ))
Search alternatives:
- developing interactive »
- interactive usage »
- usage algorithm »
- java »
-
1
-
2
Group formation using genetic algorithm
Published 2009“…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
3
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
Get full text
Get full text
Thesis -
4
-
5
Fair Traffic Scheduling and Shaping Algorithms for Diffserv Networks
Published 2006“…This thesis investigates the effect of different scheduling mechanisms and usage of a different marker algorithms then develop and implement a fair scheduling mechanism and integrate it with a shaper with the usage of a very fair efficient marker at the edge of the DiffServ networks with the usage of simulation and analytical techniques. …”
Get full text
Get full text
Thesis -
6
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
Get full text
Get full text
Get full text
Academic Exercise -
8
Applying case reuse and Rule-Based Reasoning (RBR) in object-oriented application framework documentation: Analysis and design
Published 2023Conference Paper -
9
Elitist hybrid migrating birds optimization and genetic algorithm based strategy for T-way test suite generation
Published 2020“…Software is essential in our multifaceted lifestyle today, from everyday usage to space exploration. Testing is a crucial part of software development as it determines whether the developed software is met its requirements. …”
Get full text
Get full text
Thesis -
10
An efficient real-time terrain data organization and visualization algorithm based on enhanced triangle-based level of detail technique
Published 2006“…The purpose of this research is to design, develop and implement an algorithm for enhancing the rendering efficiency of triangle-based LOD technique. …”
Get full text
Get full text
Thesis -
11
Development of genetic algorithm for optimization of yield models in oil palm production
Published 2018“…Owing to this great interest in the predictions, the study aims to develop a genetic algorithm (GA) to identify the relevant variables and search for the best combinations for modelling to examine the potential of oil palm production in Sarawak and Sabah, Borneo, Malaysia, under a given set of assumptions. …”
Get full text
Get full text
Get full text
Article -
12
Friendship Degree and Tenth Man Strategy: A new method for differentiating between erroneous readings and true events in wireless sensor networks
Published 2023“…The second stage will validate the voting process through a novel perspective based on the TMS. TMS will check the voters’ replies based on the event’s location. …”
Get full text
Get full text
Article -
13
An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar
Published 2021“…Therefore, in this research, the first objective is to develop an algorithm for a remote AR-IoT monitoring system. …”
Get full text
Get full text
Thesis -
14
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
15
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…The second agent is a reliability evaluation agent that uses a recursive algorithm to predict the suitability generator based on the frequency and duration reliability indices in each state while the third agent is the storage and transfer of data between the other two agents. …”
Get full text
Get full text
Thesis -
16
AUTO-MANAGE PARKING SYSTEM (AMPS)
Published 2019“…The purpose of this paper is to develop the Auto-manage Parking System (AMPS) that will enhance the convenience and ease of use by capturing number plate of car. …”
Get full text
Get full text
Final Year Project -
17
A study on component-based technology for development of complex bioinformatics software
Published 2004“…Othman proposed a clustering algorithm named BTreeBicluster. The BTreeBicluster starts with the development of GO tree and enriching it with expression similarity from the Sacchromyces genes. …”
Get full text
Get full text
Monograph -
18
Secure block cipher inspired by the human immune system
Published 2012“…Symmetric encryption block cipher is an important cryptographic algorithm and the quest of enhancing data security is crucial due to the heavy usage of internet and mobile devices worldwide. …”
Get full text
Get full text
Thesis -
19
Halal authentication of alcohol in food and beverages products: a review
Published 2024“…Various analytical methods have been developed to confront this issue, including using gas chromatography, mass spectrometry, electronic nose, and a combination of machine learning algorithms, biosensors, and specific gravimetry methods. …”
Get full text
Get full text
Get full text
Article -
20
Halal authentication of alcohol in food and beverages products: a review / Nur Hanisah Mohamad Ikhiwan and Nur Azira Tukiran
Published 2024“…Various analytical methods have been developed to confront this issue, including using gas chromatography, mass spectrometry, electronic nose, and a combination of machine learning algorithms, biosensors, and specific gravimetry methods. …”
Get full text
Get full text
Article
