Search Results - (( developing nation patterns algorithm ) OR ( java location based algorithm ))

Refine Results
  1. 1
  2. 2

    Group formation using genetic algorithm by Che Ani, Zhamri, Husin, Mohd Zabidin, Yasin, Azman

    Published 2009
    “…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  3. 3

    Multi-floor indoor location estimation system based on wireless local area network by Chua, Tien Han

    Published 2007
    “…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Statistical computing for forensic firearm pattern identification: Evaluating a fisher linear discriminant analysis-based algorithm against fixed-impulse noise by Chuan, Zun Liang, Abraham Lim, Bing Sern, Tan, Chek Cheng, Abdul Aziz, Jemain, Liong, Choong-Yeun

    Published 2025
    “…Furthermore, this study aligns with the United Nations Sustainable Development Goals (SDGs), particularly SDG9 (Industry, Innovation, and Infrastructure), by fostering Artificial Intelligence (AI)-driven forensic advancements and SDG16 (Peace, Justice, and Strong Institution) by strengthening forensic accuracy in criminal investigations, ultimately contributing to national security and judicial efficiency.…”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  8. 8

    Genetic Algorithm for Forecasting Bioinformatic Outcomes of Mutation-induced Cowpeas for Sustainable Development by Kehinde, Okewu, Emmanuel, Okewu, Wong, Ling Shing, Siti Sarah, Maidin

    Published 2023
    “…The aim of this work is to address malnutrition, immune deficiency, hunger, and poverty as canvassed in United Nations Sustainable Development Goals 1 and 2 (SDGs 1 and 2). …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Pengesanan minutiae imej cap jari berskala kelabu menggunakan algoritma susuran batas by Sulong, Siti Masrina

    Published 2002
    “…Raw fingerprint images and filtered images (noise removal and enhancement) are tested to determine the efficiency of the algorithm developed. The improved algorithm has applied to 350 image samples obtained from National Institute of Standards and Technology (NIST). …”
    Get full text
    Get full text
    Thesis
  10. 10

    Development of Artificial Neural Network (ANN) for lightning prediction under Malaysia environment / Jeremy AK Stewart Bedimbap by Stewart Bedimbap, Jeremy

    Published 2009
    “…In the proposed method, a three layer back-propagation neural network with Levenberg Marquardt algorithm has been developed and predicts the output data for the next four hours. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Friendship Degree and Tenth Man Strategy: A new method for differentiating between erroneous readings and true events in wireless sensor networks by Adday, Ghaihab Hassan, Subramaniam, Shamala K., Zukarnain, Zuriati Ahmad, Samian, Normalia

    Published 2023
    “…The second stage will validate the voting process through a novel perspective based on the TMS. TMS will check the voters’ replies based on the event’s location. …”
    Get full text
    Get full text
    Article
  12. 12

    Development of Artificial Neural Network for lightning prediction under Malaysia environment: article / Jeremy AK Stewart Bedimbap by Stewart Bedimbap, Jeremy

    Published 2009
    “…In the proposed method, a three layer back-propagation neural network with Levenberg Marquardt algorithm has been developed and predict the output data for four hours in advanced. …”
    Get full text
    Get full text
    Article
  13. 13

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection by Nadheer Abdulridha, Shalash

    Published 2015
    “…The second agent is a reliability evaluation agent that uses a recursive algorithm to predict the suitability generator based on the frequency and duration reliability indices in each state while the third agent is the storage and transfer of data between the other two agents. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Determining malaria risk factors in Abuja, Nigeria using various statistical approaches by Segun, Oguntade Emmanuel

    Published 2018
    “…Studies have identified many driving factors of malaria prevalence; however, there are still missing links as malaria remains endemic in developing nations despite various interventions instituted against it especially in Sub-Saharan Africa (SSA). …”
    Get full text
    Get full text
    Thesis
  18. 18

    Development and validation of a problem-solving instrument (multiple-choice questions) for computational thinking among trainee teachers in the Klang Valley, Malaysia by Abdul Hamed, Ahmad Sarji, Wong, Su Luan, Abdul Zani, Mohd Zariat

    Published 2024
    “…Malaysia has recognized this need by embedding CT into its national curriculum, emphasizing key components such as abstraction, decomposition, pattern recognition, algorithms, logical reasoning, and evaluation. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20

    Spatial analysis of infant mortality in Peninsular Malaysia over three decades using mixture models by Nuzlinda Abdul Rahman, Abdul Aziz Jemain

    Published 2013
    “…Infant mortality is one of the central public issues in most of the developing countries. In Malaysia, the infant mortality rates have improved at the national level over the last few decades. …”
    Get full text
    Get full text
    Get full text
    Article