Search Results - (( developing moderating function algorithm ) OR ( java location based algorithm ))

Refine Results
  1. 1
  2. 2

    Group formation using genetic algorithm by Che Ani, Zhamri, Husin, Mohd Zabidin, Yasin, Azman

    Published 2009
    “…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  3. 3

    Multi-floor indoor location estimation system based on wireless local area network by Chua, Tien Han

    Published 2007
    “…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  7. 7

    Analysis of Traffic Accident Patterns Using Association Rule Mining by Yudy, Pranata, Tri Basuki, Kurniawan, Edi Surya, Negara, Ahmad Haidar, Mirza

    Published 2024
    “…This study analyzed the levels of minor, moderate, and severe traffic accidents in the Palembang Police area from 2015 to 2020 using association rule mining and the apriori algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Friendship Degree and Tenth Man Strategy: A new method for differentiating between erroneous readings and true events in wireless sensor networks by Adday, Ghaihab Hassan, Subramaniam, Shamala K., Zukarnain, Zuriati Ahmad, Samian, Normalia

    Published 2023
    “…The second stage will validate the voting process through a novel perspective based on the TMS. TMS will check the voters’ replies based on the event’s location. …”
    Get full text
    Get full text
    Article
  9. 9

    Using genetic algorithms to optimise land use suitability by Pormanafi, Saeid

    Published 2012
    “…The first task was studying the dominant of crops and economic suitability evaluation of land with the land evaluation framework developed by FAO, (1976-2007) using GIS. Second task is to determine the fitness function for the genetic algorithms. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Penggunaan penggugusan subtraktif bagi menjana peraturan kabur by Agus Priyono, Muhammad Ridwan, Ahmad Jais Alias, Riza Atiq O. K. Rahmat, Azmi Hassan, Mohd. Alauddin Mohd. Ali

    Published 2005
    “…By using the fuzzy clustering algorithm, membership function could be counted based on two possible clustering methods. …”
    Get full text
    Get full text
    Article
  12. 12

    Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection by Nadheer Abdulridha, Shalash

    Published 2015
    “…The second agent is a reliability evaluation agent that uses a recursive algorithm to predict the suitability generator based on the frequency and duration reliability indices in each state while the third agent is the storage and transfer of data between the other two agents. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Development of noise induced hearing loss prediction model using artificial neural network / Siti Fairus Mohd Zain by Mohd Zain, Siti Fairus

    Published 2019
    “…It also embedded with 10 hidden layers in the prediction models using Levenberg-Marquardt algorithm as a transfer function from input vectors to the five binary outputs. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Sustainable smart irrigation system (SIS) using solar PV with rainwater harvesting technique for indoor plants by Islam, Syed Zahurul, Kamarudin, Muhammad Saufi, Abdullah, Mohd Noor, Mohaffyza, Mimi, Sern, Lai Chee, Othman, Mohammad Lutfi, Uddin, Jasim

    Published 2025
    “…The IoT system consists of soil moisture sensor with GSM module powered by PV and an algorithm was developed to adjust irrigation schedules based on soil moisture data. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Sustainable Smart Irrigation System (SIS) using solar PV with rainwater harvesting technique for indoor plants by Islam, Syed Zahurul, Kamarudin, Muhammad Saufi, Abdullah, Mohd Noor, Mohaffyza, Mimi, Sern, Lai Chee, Othman, Mohammad Lutfi, Uddin, Jasim

    Published 2025
    “…The IoT system consists of soil moisture sensor with GSM module powered by PV and an algorithm was developed to adjust irrigation schedules based on soil moisture data. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Sleep as a predictor of depression level using Naïve Bayes / Nur Syakinah Md Roduan by Md Roduan, Nur Syakinah

    Published 2017
    “…Functionality testing are also done to make sure that the system is working properly without having any error. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Operational structural damage identification using de-noised modal feature in machine learning / Chen Shilei by Chen , Shilei

    Published 2021
    “…By integrating ISMA, both supervised and unsupervised machine learning algorithms were investigated to develop real-time damage identification schemes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Characterization of transdermal drug delivery system using visible spectrophotometry and artificial neural network / Normaizira Hamidi by Hamidi, Normaizira

    Published 2009
    “…The tangent sigmoidal (tansig) function was used for the ANN activation and mean square error (MSE) of the network prediction is used as the cost function during each iteration of the training process. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Segmenting the right ventricle cavity from 4D echocardiography images for stroke volume measurement by Abboud, Anas A.

    Published 2014
    “…Thus it doesn’t represent the actual structure of the RV cavity. New algorithms are needed to assess the abnormality of the right ventricle. …”
    Get full text
    Get full text
    Thesis