Search Results - (( java location based algorithm ) OR ( knowledge utilization using algorithm ))
Search alternatives:
-
1
-
2
Group formation using genetic algorithm
Published 2009“…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
3
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
Get full text
Get full text
Thesis -
4
Document clustering for knowledge discovery using nature-inspired algorithm
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
5
-
6
Development of self-learning algorithm for autonomous system utilizing reinforcement learning and unsupervised weightless neural network / Yusman Yusof
Published 2019“…One of the key issues of developing an autonomous system is that it requires pre-defined knowledge by an expert. This knowledge is then converted into computer program or by utilizing exhaustively trained and tested Artificial Intelligence (AI) algorithm. …”
Get full text
Get full text
Thesis -
7
Sentiment mining using immune network algorithm /Raja Muhammad Hafiz Raja Kamarudin
Published 2012“…This research tries to utilize biological-inspired computing algorithm, Immune Network algorithm, in this sentiment analysis field. …”
Get full text
Get full text
Thesis -
8
Knowledge base processing method based on text classification algorithm
Published 2023“…The text classification algorithm's knowledge base processing method utilizes existing data from the knowledge base to guide the construction and training of the classification model. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
Get full text
Get full text
Get full text
Academic Exercise -
11
A new multiple ant colonies optimization algorithm utilizing average pheromone evaluation mechanism
Published 2008Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Improved autonomous charging of mobile multi-robots using honeybee-inspired algorithm
Published 2016“…However, in this thesis, the algorithm based on inspiration of the honeybee’s behavior is improved to manage and improve energy utilization of the mobile multi-robot to emulate the working and foraging behavior. …”
Get full text
Get full text
Thesis -
13
Big data clustering using grid computing and ant-based algorithm
Published 2013“…This paper presents a framework for big data clustering which utilizes grid technology and ant-based algorithm.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Data mining using genetic algorithm in finance data / A. Noor Latiffah and A. B. Nordin
Published 2006“…This project, wilt extract some useful financial knowledge from the Syariah Index data of Kuala Lumpur Syariah Index (KLSI). …”
Get full text
Get full text
Conference or Workshop Item -
15
Discovering decision algorithm of distance protective relay based on rough set theory and rule quality measure
Published 2011“…Thus, this thesis addresses these issues with the objective of intelligently divulging the knowledge hidden in the recorded event report at a relay device level using a data mining strategy based on Rough Set Theory, Genetic Algorithm and Rule Quality Measure under supervised learning within the framework of Knowledge Discovery in Database (KDD) in order to discover the relay’s decision algorithm (prediction rules) and, subsequently, the association rule. …”
Get full text
Get full text
Thesis -
16
A Continuous Overlay Path Probing Algorithm For Overlay Networks
Published 2013“…Several experiments were carried out using the OMNeT++ simulation framework. The designed algorithm was evaluated using experimental data. …”
Get full text
Get full text
Thesis -
17
Hybrid group decision making method based on multi-granular information using fusion algorithms and consistent fuzzy preference relation / Siti Amnah Mohd Ridzuan
Published 2017“…While for multigranular uncertain linguistic information, the evaluation will be aggregated into CLFPR values and the final preference of the alternative will be determined using a method of ranking fuzzy numbers. Both algorithm been illustrated in textbook selection. …”
Get full text
Get full text
Thesis -
18
GPU-based odd and even hybrid string matching algorithm
Published 2016Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Determining number of clusters using firefly algorithm with cluster merging for text clustering
Published 2015“…Such a scenario requires a dynamic text clustering method that operates without initial knowledge on a data collection.In this paper, a dynamic text clustering that utilizes Firefly algorithm is introduced.The proposed, aFAmerge, clustering algorithm automatically groups text documents into the appropriate number of clusters based on the behavior of firefly and cluster merging process. …”
Get full text
Get full text
Book Section -
20
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…The proposed algorithm has utilized the advantages of both algorithms to balance the exploration and exploitation search process. …”
Get full text
Get full text
Thesis
