Search Results - (( java location based algorithm ) OR ( based validation using algorithm ))
Search alternatives:
- based validation »
- validation using »
- using algorithm »
- java »
-
1
Friendship Degree and Tenth Man Strategy: A new method for differentiating between erroneous readings and true events in wireless sensor networks
Published 2023“…The second stage will validate the voting process through a novel perspective based on the TMS. …”
Get full text
Get full text
Article -
2
-
3
Group formation using genetic algorithm
Published 2009“…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
4
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
Get full text
Get full text
Thesis -
5
-
6
Cluster validity of the fuzzy C-means algorithm in mammographic image using adaptive cluster & partition entropy indexes / Azwani Aziz
Published 2010“…Partition Entropy is the most frequently used cluster validity index. In most of fuzzy cluster validity indexes, the separation measures are calculation based on the distances among cluster centers. …”
Get full text
Get full text
Thesis -
7
-
8
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
Get full text
Get full text
Get full text
Academic Exercise -
10
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
Published 2019“…Therefore, it can be concluded that the strength and validity of KSAHC algorithm have been enhanced as compared to other algorithms and can serve as the alternative algorithm in designing security systems.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Validation on an enhanced dendrite cell algorithm using statistical analysis
Published 2017“…This study demonstrates the mechanism of evaluating an enhanced algorithm using performance metrics and validated it using statistical analysis. …”
Get full text
Get full text
Get full text
Article -
12
Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects
Published 2018“…Hence, a validation protocol algorithm based on hash function labelling provides a one-time security header for transferable files that protects data in transit against any unauthorized injection. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Efficient signaling schedule for centralized and distributed scheduling algorithms for wimax multi-hop relay networks
Published 2012“…Validation of the proposed algorithm (MR-CSA) was based on comparison of its performance with the performance of the centralized pairing algorithm while the proposed MR-DSA algorithm was validated through comparing its performance against that of the factor-graph-based low-complexity distributed scheduling algorithm (FGDS) algorithms in terms of throughput and the average packet throughput. …”
Get full text
Get full text
Thesis -
14
Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking
Published 2012“…The first contribution is automatic detection of seed points which serve as a prerequisite step for centerline extraction algorithm. The solution consists of an algorithm for automatic collection of candidate seed points using efficient grid line searching mechanism and a validation method which uses local geometric and intensity based features as effective validation rules to discriminate between the actual seed point and false alarms. …”
Get full text
Get full text
Thesis -
15
HAPTIC VISUALIZATION USING VISUAL TEXTURE INFORMATION
Published 2011Get full text
Get full text
Thesis -
16
-
17
Job position prediction based on skills and experience using machine learning algorithm / Ezaryf Hamdan
Published 2024“…Text preprocessing ensures consistent data representation and facilitates validation. The Machine Learning algorithm, comprising Random Forest, Linear Regression, XGBoost, SVM, and Stacking Ensemble, is embedded in the system for job position predictions based on the analysed data. …”
Get full text
Get full text
Thesis -
18
Cluster Analysis of Data Points using Partitioning and Probabilistic Model-based Algorithms
Published 2014“…This study explores the performance accuracies of partitioning-based algorithms and probabilistic model-based algorithm. …”
Get full text
Get full text
Get full text
Article -
19
Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi
Published 2017“…Testing of the application are using 10-Fold Cross Validation technique. 90% of the data be used as a training and another 10% be used for the testing part. …”
Get full text
Get full text
Thesis -
20
March-based diagnosis algorithm for static random-access memory stuck-at faults and transition faults
Published 2012“…The fault syndrome based on read operations of the proposed algorithm is generated to determine its diagnostic capability. …”
Get full text
Get full text
Thesis
