Search Results - (( developing local users algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- implication based »
- developing local »
- java implication »
- users algorithm »
- local users »
-
1
An adaptive ant colony optimization algorithm for rule-based classification
Published 2020“…Various classification algorithms have been developed to produce classification models with high accuracy. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
-
3
Second Level Password Generator
Published 2010“…Therefore, it is important to have a second level security to the user's password. Cryptography is an art to convert a message into other forms by using some algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
4
Course Time Table Scheduling for a Local College
Published 2009“…The prototype software will be on a local search approach with reference to Hill Climbing with Random Walk algorithm and Best First Search algorithm. …”
Get full text
Get full text
Get full text
Thesis -
5
Mobile game application development using evolutionary algorithms
Published 2014“…Evolutionary Algorithms have never been used on mobile applications, thus it gives a novel idea of utilizing Evolutionary Algorithms in developing applications typically in games for mobile platforms. …”
Get full text
Get full text
Get full text
Thesis -
6
Off-the-shelf indoor localization system using radio frequency for wireless local area network
Published 2018“…Recently, several of indoor localization techniques that are based on signals of wireless local area network (WLAN) become a substantial issue in recent research. …”
Get full text
Get full text
Thesis -
7
Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar
Published 2012“…New integration also have an extra value security because of the symmetric algorithm was developed locally in Malaysia. Apart from symmetric algorithm, Public Key Infrastructure technologies that one of the asymmetric algorithm have been select as a part of new integration. …”
Get full text
Get full text
Thesis -
8
Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin
Published 2024“…The project successfully achieves its predetermined objectives, culminating in the development of an effective Remote to Local (R2L) Intrusion Detection System utilizing the Decision Tree algorithm. …”
Get full text
Get full text
Thesis -
9
AN INVESTIGATION OF INDOOR LOCALIZATION BASED ON WI-FI FOR MOBILE USER
Published 2019“…A new indoor localization system with the make use of matching algorithms is developed and analyzed.”…”
Get full text
Get full text
Final Year Project -
10
Improving explicit aspects extraction in sentiment analysis using optimized ruleset / Mohammad Ahmad Jomah Tubishat
Published 2019“…In addition, the improved WOA is developed by using Cauchy mutation and local search algorithm to solve its local optima problem and improve population diversity. …”
Get full text
Get full text
Get full text
Thesis -
11
Outdoor User Location over 802.11 Ad-hoc Network
Published 2006“…From the collected data, the radio propagation models are determined. A Graphical User Interface (GUI) has been developed to make the process of location determination become less complicated and more user friendly. …”
Get full text
Get full text
Final Year Project -
12
Energy detection for spectrum sensing in OFDM-based cooperative and non-cooperative radio networks
Published 2018“…With the purpose of low SNR effect reduction, the expression is presented a novel Constant Local False Alarm Rate (CLFAR) with Constant Local Detection Rate (CLDR) algorithm, in which Secondary User (SU) can detect the licensed band in high noise variance medium accurately. …”
Get full text
Get full text
Thesis -
13
Novel Architecture for Transactive Energy Management Systems with Various Market Clearing Strategies
Published 2023“…Further, an optimal load scheduling algorithm is developed at the end-users' premises to improve the profits in the LEM. …”
Get full text
Get full text
Article -
14
Performance evaluation of vertical handoff in fourth generation (4G) networks model
Published 2009Get full text
Working Paper -
15
Making location-aware computing working accurately in smart spaces
Published 2011“…We present our current development on a light-weight algorithm, which is easy, simple but robust in producing the determination of user location using WiFi signals. …”
Get full text
Get full text
Get full text
Book Chapter -
16
-
17
Two-factor authentication smart entryway using modified LBPH algorithm
Published 2024“…The system employs the Local Binary Patterns Histograms for the full face recognition algorithm and modified LBPH algorithm for occluded face detection. …”
Get full text
Get full text
Get full text
Article -
18
Localization for autonomous car using deep learning
Published 2023“…In this paper, it aims to focus on how the localization works with the proposed methods. The proposed method will use the OpenCV computer vision algorithms and other solutions to solve the localization problem.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Indoor location estimation utilizing Wi-Fi Signals
Published 2020“…MATLAB Graphical User Interface and Android has been used to develop a user interface for simulation purposes. …”
Get full text
Get full text
Get full text
Article -
20
Development of FRID based 2d localization simulation for autonomous guided vehicle tracking in indoor environment
Published 2018“…The mathematical process is coded in a software to produce a graphical user interface (GUI) based simulation for 2D localization of AGV tracking in indoor environment. …”
Get full text
Get full text
Get full text
Get full text
Article
