Search Results - (( java location based algorithm ) OR ( knowledge coding using algorithm ))
Search alternatives:
- knowledge coding »
- using algorithm »
- coding using »
- java »
-
1
-
2
Group formation using genetic algorithm
Published 2009“…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
3
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
Get full text
Get full text
Thesis -
4
-
5
Improving the evaluation performance of space-time trellis code through visualisation
Published 2011“…In this paper we present a new visualisation approach in the effort of improving the evaluation strategy of space-time trellis code (STTC) generator matrix G. To our knowledge, although visualisation is widely used to handle a variety of problems, it has never been employed specifically to solve complexity problems that are related to generator matrix G evaluation. …”
Get full text
Get full text
Conference or Workshop Item -
6
Genetic algorithm fuzzy logic for medical knowledge-based pattern classification
Published 2018“…GAFL, with simplistic binary coding scheme using Pittsburg approach managed to exploit the potential of genetic fuzzy inference system with ease of comprehension in fuzzy rules induction in knowledge pattern recognition. …”
Get full text
Get full text
Article -
7
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Improving the evaluation performance of space-time trellis code through STTC visualisation tool
Published 2013“…In this paper we present a new visualisation approach in the effort of improving the evaluation strategy of space-time trellis code (STTC) generator matrix G. To our knowledge, although visualisation is widely used to handle a variety of problems, it has never been employed specifically to solve complexity problems that are related to generator matrix G evaluation. …”
Get full text
Get full text
Get full text
Article -
9
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
Get full text
Get full text
Get full text
Academic Exercise -
10
Genetic algorithm fuzzy logic for medical knowledge-based pattern classification
Published 2023“…GAFL, with simplistic binary coding scheme using Pittsburg approach managed to exploit the potential of genetic fuzzy inference system with ease of comprehension in fuzzy rules induction in knowledge pattern recognition. …”
Article -
11
Software regression test case prioritization for object-oriented programs using genetic algorithm with reduced-fitness severity
Published 2015Get full text
Get full text
Conference or Workshop Item -
12
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The study recommends to use another type of digital signature algorithm to be used in the proposed method. …”
Get full text
Get full text
Student Project -
13
-
14
Job recruiting system using sorting Algorithm / Adi Asyraf Ayob
Published 2020“…The requirements of the system was first identified by interview session with an IT company before proceeding to system design and development which involve process of designing prototype and scripting the system coding. The functionality of the prototype was tested using Test Script while the usability testing was performed by collecting response from the system users about the usefulness, ease of use, and satisfaction. …”
Get full text
Get full text
Thesis -
15
Form four chemistry teachers’ conceptualization of pedagogical content knowledge / Chien Lee Shing
Published 2016“…Pedagogical content knowledge (PCK) was defined as the knowledge of teaching resulted from the integration of pedagogy and subject matter knowledge. …”
Get full text
Get full text
Thesis -
16
Algorithm-program visualization model : An intergrated software visualzation to support novices' programming comprehension
Published 2015“…This model is then to be used in the prototype tool development that is called 3De-ALPROV (Design Development Debug – Algorithm Program Visualization). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Classification of machine learning engines using latent semantic indexing
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Constrained clustering approach to aid in remodularisation of object-oriented software systems / Chong Chun Yong
Published 2016“…Even if maintainers possess additional information that could be useful to guide and improve the clustering results, traditional clustering algorithms have no way to take advantage of this information. …”
Get full text
Get full text
Thesis -
19
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
20
A study on matrix factorization and its applications
Published 2021“…Computational steps are important as it serves the basic knowledge to code it in Python. Python also consists of libraries that can be used to calculate the approximated matrix with some parameter tuning. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
