Search Results - (( java implementation using algorithm ) OR ( mobile location based algorithm ))

Refine Results
  1. 1

    Multi-floor indoor location estimation system based on wireless local area network by Chua, Tien Han

    Published 2007
    “…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  3. 3

    Extreme learning machine for user location prediction in mobile environment by Mantoro, Teddy, Olowolayemo, Akeem, Olatunji, Sunday O., Ayu, Media A., Abu Osman, Md. Tap

    Published 2011
    “…This work examines the location determination techniques by attempting to determine the location of mobile users by taking advantage of SS and SQ history data and modeling the locations using the ELM algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Extreme learning machine for user location prediction in mobile environment by Mantoro, Teddy, Olowolayemo, Akeem, Olatunji, Sunday O., Ayu, Media Anugerah, Md. Tap, Abu Osman

    Published 2011
    “…This work examines the location determination techniques by attempting to determine the location of mobile users by taking advantage of SS and SQ history data and modeling the locations using the ELM algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  7. 7

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    The child tracker using location awareness / Muhammad Idham Amdan by Amdan, Muhammad Idham

    Published 2017
    “…One the significance feature of this project is to track the position of device precisely. The location retrieve from client or the tracked device will be computed and filtered based on the algorithm to generate addresses from latitude and longitude, the coordinate of mobile phone. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Enhanced location and positioning in wimax networks with virtual mimo base station by Othman, Muhammad Hakim

    Published 2015
    “…Furthermore, a new hybrid algorithm enhancement of mobile station (MS) location estimation by using a single MIMO base station (SMBS) with the virtual base station has been introduced. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Simulation of Virtual MIMO Base Stations for Mobile Location in IMT-Advanced Networks by Awang Md Isa, Azmi, Mohamad Isa, Mohd Sa'ari, Zakaria, Zahriladha, Mohd Zin, Mohd Shahril Izuan

    Published 2012
    “…The conventional Location and Positioning (L&P) methods rely on availability of base station (BS) locations as well as mitigation of propagation effects. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Autonomous path planning robot using geographical information by Ismail Ishaq Ibrahim

    Published 2008
    “…The guidance algorithm is formed based on an initial direction and distance of the target location without considering the time taken by the robot to reach the desired destination. …”
    Get full text
    Learning Object
  15. 15

    Improved Location And Positioning Utilizing Single MIMO Base Station In IMT-Advanced System by Azmi, Awang Md Isa, Mustafa H., Othman, Zahariah, Manap, Mohd Sa'ari, Mohamad Isa, Mohd Shahril Izuan, Mohd Zin, Mohd Shakir, Md Saat, Zahriladha, Zakaria

    Published 2016
    “…The Single MIMO Base Station (SMBS) in mobile WiMAX is combined with a virtual technique, known as the Virtual Base Stations, created a novel algorithm for location and positioning (L&P) purposes. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    A new multicast-based architecture to support host mobility in IPv6 by M. Ali, Borhanuddin, Habaebi, Mohamed Hadi, AI-Talib, Sahar

    Published 2003
    “…A new multicast group joidleave mechanism for mobile nodes (MNs) is proposed. The mechanism is based on hash algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  17. 17

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    A coalition model for efficient indexing in wireless sensor network with random mobility / Hazem Jihad Ali Badarneh by Hazem Jihad , Ali Badarneh

    Published 2021
    “…First, the high dependability on multi-attributes (location and time) of packets in random mobile sensors. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Particle filter approach for estimating indoor mobile user location using IEEE 802.11 signals (F1090) by Mantoro, Teddy, Ayu, Media Anugerah, Raman, Shakiratul Husna, Md. Latiff , Nurul Hidayati

    Published 2011
    “…The paper discussed the comparison between the true location and the estimated location based on two types of signals data: normal data and noise data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  20. 20

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
    Get full text
    Get full text
    Get full text
    Book