Search Results - (( java location based algorithm ) OR ( parameter solution matching algorithm ))

Search alternatives:

Refine Results
  1. 1

    Combining Recursive Least Square and Principal Component Analysis for Assisted History Matching by Md. Anuar, Nurul Syaza

    Published 2014
    “…History matching is a process of altering parameters in a reservoir simulator in order to match production performance with observed historical data. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Artificial neural network and inverse solution method for assisted history matching of a reservoir model by Negash, B.M., Vel, A., Elraies, K.A.

    Published 2017
    “…A typical inverse problem encountered in petroleum industries is referred to as history matching. In the early days, history matching was undertaken by manually changing sensitive reservoir parameters until a reasonable match between observed and simulated pressure and production data are obtained. …”
    Get full text
    Get full text
    Article
  3. 3
  4. 4
  5. 5
  6. 6

    Measuring height of high-voltage transmission poles using unmanned aerial vehicle (UAV) imagery by Qayyum, A., Malik, A.S., Saad, N.M., bin Abdullah, M.F., Iqbal, M., Rasheed, W., Bin Ab Abdullah, A.R., Hj Jaafar, M.Y.

    Published 2017
    “…Results were compared with well-known algorithms; including, for example, global and local stereo matching algorithms. …”
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Group formation using genetic algorithm by Che Ani, Zhamri, Husin, Mohd Zabidin, Yasin, Azman

    Published 2009
    “…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  9. 9

    Multi-floor indoor location estimation system based on wireless local area network by Chua, Tien Han

    Published 2007
    “…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Development of Graphical User Interface (GUI) for Antenna Design by Cheow , Yeng Peng

    Published 2016
    “…This project involves four main phases, which is the theoretical modeling of antenna, critical review design of antenna, implementation of synthesis algorithm of antenna and the GUI development. The methodology of this project involved the selection of antenna types to design, computation of antenna parameters, analysis of antenna performance and lastly end with the impedance matching solution. …”
    Get full text
    Get full text
    Final Year Project
  11. 11
  12. 12
  13. 13

    The effect of key parameters on the design of an optimized CAES power plant by Khalaji Assadi , M, Shamshirgaran , S.R, Defaee Rad, S

    Published 2017
    “…Among all, Compressed air energy storage (CAES) technology has proposed itself as a reliable and efficient solution to match the two sides. This paper deals with a modeled compressed air energy storage power plant which has been optimized thermodynamically through an efficient genetic algorithm code. …”
    Get full text
    Get full text
    Article
  14. 14

    An advanced scheme based on Artificial Intelligence technique for solving nonlinear Riccati systems by Admon, Mohd Rashid, Senu, Norazak, Ahmadian, Ali, Abdul Majid, Zanariah

    Published 2024
    “…Numerical results demonstrate that the proposed method not only closely matches the exact solutions and reference solutions but also is more accurate than other existing methods. © The Author(s) under exclusive licence to Sociedade Brasileira de Matemática Aplicada e Computacional 2024.…”
    Get full text
    Get full text
    Article
  15. 15

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  17. 17

    Deep learning model for predicting and detecting overlapping symptoms of cardiovascular diseases in hospitals of UAE by Abbas Alhadeethy, Najwa Fadhil, Khedher, Akram M Z M, Shah, Asadullah

    Published 2012
    “…Hence, the best clinical applications of DL require considerate problem solving solution, selection of the most suitable DL algorithms and information, and defining balance of outcome. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Model of Bayesian tangent eye shape for eye capture by Nsaef, Asama Kuder, Jaafar, Azizah, Sliman, Layth, Sulaiman, Riza, O. K. Rahmat, Rahmita Wirza

    Published 2014
    “…Owing to maximum a posteriori estimation, we can identify similarity transform coefficients as well as the eye shape parameters in BTESM. To apply the maximum a posteriori procedure, tangent Eye shape vector was considered the state of the model which is hidden and expectation maximization depending on searching algorithm was adopted. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Passive Client-Centric Rogue Access Point Detection Framework For WiFi Hotspots by Ahmad, Nazrul Muhaimin

    Published 2018
    “…The proliferation of Wi-Fi hotspots in public places provides seamless Internet connectivity anywhere at any time to the wireless clients.Although many hotspots are often unprotected,unmanaged and unencrypted,this does not prevent the clients from actively connecting to the network.The underlying problem is that the network Access Point (AP) is always trusted.The adversary can impersonate a legitimate AP by setting up a rogue AP to commit espionage and to launch evil-twin attack,session hijacking,and eavesdropping.To aggravate the threats, existing detection solutions are ill-equipped to safeguard the client against rogue AP.Infrastructure- centric solutions are heavily relied on the deployment of sensors or centralized server for rogue AP detection, which are limited,expensive and rarely to be implemented in hotspots.Even though client-centric solutions offer threat-aware protection for the client,but the dependency of the existing solutions on the spoofable contextual network information and the necessity to be associated with the network makes those solutions are not viable for the hotspot’s client.Hence,this work proposes a framework of passive client-centric rogue AP detection for hotspots.Unlike existing solutions,the key idea is to piggyback AP-specific and network-specific information in IEEE 802.11 beacon frame that enables the client to perform the detection without authentication and association to any AP.Based on the spatial fingerprints included in the broadcasted information from the APs in the vicinity of the client,this work discloses a novel concept that enables the rogue AP detection via the client’s ability to self-colocalize and self-validate its own position in the hotspot.The legitimacy of the APs in the hotspot,in this view,lies in the fact that the correct matching between the Received Signal Strength Indicator (RSSI) measurements at the client and pre-recorded fingerprints is attainable when the beacons are transmitted only from the legitimate APs.Hence,any anomalousness in AP’s beacon frame or any attempt to replay the legitimate AP’s beacon frame from different location can be detected and classified as rogue AP threats.Through experiments in real environment,the results demonstrate that with proper algorithm selection and parameters tuning,the rogue AP detection framework can achieve over 90% detection accuracy in classifying the absence and presence of rogue AP threats in the hotspot.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Friendship Degree and Tenth Man Strategy: A new method for differentiating between erroneous readings and true events in wireless sensor networks by Adday, Ghaihab Hassan, Subramaniam, Shamala K., Zukarnain, Zuriati Ahmad, Samian, Normalia

    Published 2023
    “…The second stage will validate the voting process through a novel perspective based on the TMS. TMS will check the voters’ replies based on the event’s location. …”
    Get full text
    Get full text
    Article