Search Results - (( java implementation modified algorithm ) OR ( user estimation path algorithm ))

  • Showing 1 - 18 results of 18
Refine Results
  1. 1

    Analysis of Dijkstra’s and A* algorithm to find the shortest path by Alija, Amani Saleh

    Published 2015
    “…In this study, two algorithms will be focused on. This study compares the Dijkstra’s, and A* algorithm to estimate search time and distance of algorithms to find the shortest path. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Multi-user mmWave MIMO channel estimation with hybrid Beamforming over frequency selective fading channels by Uwaechia, Anthony Ngozichukwuka, Mahyuddin, Nor Muzlifah, Ain, Mohd Fadzil, Abdul Latiff, Nurul Muazzah, Za'bah, Nor Farahidah

    Published 2020
    “…In this paper, a multi-user channel estimation (CE) scheme namely generalized-block compressed sampling matching pursuit (G-BCoSaMP), is proposed for multi-user mmWave MIMO systems over frequency selective fading channels. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  3. 3

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  6. 6

    Fuzzy logic-based arrival time estimation for indoor navigation using augmented reality by Mohammed Sohif, Muhammad Hidayat, Mardzuki, Muhammad Imran, Mohd Ibrahim, Azhar, Haja Mohideen, Ahmad Jazlan

    Published 2025
    “…Mobile applications designed for indoor navigation often rely on expensive and computationally demanding beacons or natural markers to track the user's location along a predetermined path. Furthermore, traditional navigation estimation methods based on GPS are ineffective for indoor navigation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  8. 8

    A network aware based recommender system for VOIP application service in eLearning environment / Nazdiana Ab. Wahab by Ab. Wahab, Nazdiana

    Published 2009
    “…Pathload has been chosen as a measurement tool that estimates the available bandwidth of a network path.…”
    Get full text
    Get full text
    Thesis
  9. 9

    A smart marker-based indoor navigation system by Teoh, Zhen Quan

    Published 2024
    “…The proposed system also employs algorithms to calculate the shortest path for navigation and estimate the user position for localization when the user scans a marker. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Compressed channel estimation for massive MIMO-OFDM systems over doubly selective channels by Uwaechia, Anthony Ngozichukwuka, Mahyuddin, Nor Muzlifah, Ain, Mohd Fadzil, Abdul Latiff, Nurul Muazzah, Za'bah, Nor Farahidah

    Published 2019
    “…For example, at SNR=20 dB for K=4 users, Doppler shift=0.093 with NT=32 antenna size, the adaptive-QBSO algorithm with G-SBEM and the proposed gQBSO with modified-SBEM can realize approximately 75.44%and 85.14% of the NMSE achieved by the oracle estimator with modified-SBEM.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Performance Enhancement Of Ultra-Wideband Power Control Using Ranging And Narrowband Interference Mitigation by Saeed, Rashid Abdelhaleem

    Published 2008
    “…In this thesis we propose a maximum likelihood algorithm enhanced with synchronization scheme to estimate the time delay of direct-path signal in NLOS multi-path fading environment and mean acquisition time. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Wi-Fi signal strengths database construction for indoor positioning systems using Wi-Fi RFID by Narzullaev, Anvar, Selamat, Mohd Hasan

    Published 2013
    “…Compared to existing calibration procedure our method requires only few signal samples from RFID tags to be collected and rest of the database is recovered using path-loss prediction algorithm.…”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    A Study of Visual Attention in Diagnosing Cerebellar Tumours by Kuryati, Kipli, Kasumawati, Lias, Dayang Azra, Awang Mat, Othman, A.K., Ade Syaheda Wani, Marzuki, Zamhari, N.

    Published 2009
    “…Visual attention allows user to select the most relevant information to ongoing behaviour. …”
    Get full text
    Get full text
    Article
  15. 15

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection by Nadheer Abdulridha, Shalash

    Published 2015
    “…Meanwhile, the second MAS model has been designed using two agents as follows: the first agent is a fault current agent that is to determine the fault current at all points before and after grounding; the second agent is the time operating of the agent which is used to determine the relay operating time before and after modifying fault current. The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…There is also a need to consider implementing this strategy for dynamic object-oriented languages such as Python, Lisp, and Smalltalk.…”
    Get full text
    Get full text
    Thesis