Search Results - (( java location based algorithm ) OR ( problem implication based algorithm ))
Search alternatives:
- problem implication »
- implication based »
- java »
-
1
-
2
Group formation using genetic algorithm
Published 2009“…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
3
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
Get full text
Get full text
Thesis -
4
-
5
-
6
Using predictive analytics to solve a newsvendor problem / S. Sarifah Radiah Shariff and Hady Hud
Published 2023“…Secondly, in solving every Machine Learning problem, there is no one algorithm superior to other algorithms. …”
Get full text
Get full text
Book Section -
7
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
Get full text
Get full text
Get full text
Academic Exercise -
9
Optimization of an extended H-infinity controller for unmanned helicopter control using multiobjective differential evolution (MODE)
Published 2015“…Then apply the MODE-based algorithm to optimize the weighting function of the control problem formulation for optimal performance. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
10
Standardizing and weighting the evaluation criteria of many-objective optimization competition algorithms based on fuzzy delphi and fuzzy-weighted zero-inconsistency methods
Published 2021“…Thus, this research aims to standardize and weigh the evaluation criteria of MaOO competitive algorithms base on fuzzy Delphi and new fuzzy-weighted zero-inconsistency (FWZIC) methods. …”
Get full text
Get full text
Thesis -
11
Computing the maximum violation of a Bell inequality is an NP-problem
Published 2016“…The proof that the optimization of such correlation measure is an NP-problem based on an operational perspective involving a Turing machine, which follows a general algorithm. …”
Get full text
Get full text
Article -
12
-
13
A Method for Mapping XML DTD to Relational Schemas In The Presence Of Functional Dependencies
Published 2008“…To approach the mapping problem, three different components are explored: the mapping algorithm, functional dependency for XML, and implication process. …”
Get full text
Get full text
Thesis -
14
Friendship Degree and Tenth Man Strategy: A new method for differentiating between erroneous readings and true events in wireless sensor networks
Published 2023“…The second stage will validate the voting process through a novel perspective based on the TMS. TMS will check the voters’ replies based on the event’s location. …”
Get full text
Get full text
Article -
15
The effectiveness of problem-based serious games on learning and learning motivation in the context of 3D computer graphics / Meisam Moradi
Published 2022“…This study and the game design in this study can have pedagogical and practical implications for 3D computer graphics lecturers and those who are interested in designing effective problem-based SGs. …”
Get full text
Get full text
Get full text
Thesis -
16
A fuzzy approach for early human action detection / Ekta Vats
Published 2016“…Therefore, a new space-time fuzzy implication operator is introduced, by modifying the existing implication operators to accommodate time as an added dimension. …”
Get full text
Get full text
Thesis -
17
Manufacturing process planning optimisation in reconfigurable multiple parts flow lines
Published 2008“…Design/methodology/approach: The genetic algorithm methodology implements a genetic algorithm that is augmented by application specific heuristics in order to guide the search for an optimal solution. …”
Get full text
Get full text
Get full text
Article -
18
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
19
A hybrid deep learning-based unsupervised anomaly detection in high dimensional data
Published 2022“…Anomaly detection in high dimensional data is a critical research issue with serious implication in the real-world problems. Many issues in this field still unsolved, so several modern anomaly detection methods struggle to maintain adequate accuracy due to the highly descriptive nature of big data. …”
Get full text
Get full text
Article -
20
A balanced partitioning mechanism for multicontroller placement in software-defined wide area networks
Published 2022“…Consequently, the objective of this study is to propose a Balanced Partitioning Mechanism (BPM) based on the notion of a network partition. Moreover, the BPM is designed based on a modified K-means algorithm. …”
Get full text
Get full text
Thesis
