Search Results - (( java location based algorithm ) OR ( program selection modified algorithm ))
Search alternatives:
- selection modified »
- program selection »
- java »
-
1
Model structure selection for a discrete-time non-linear system using genetic algorithm
Published 2004“…The results show that the proposed algorithm can be employed as an algorithm to select the structure of the proposed model.…”
Get full text
Get full text
Get full text
Article -
2
Model structure selection for a discrete-time non-linear system using a genetic algorithm
Published 2004“…The results show that the proposed algorithm can be employed as an algorithm to select the structure of the proposed model.…”
Get full text
Get full text
Article -
3
Model structure selection for a discrete-time non-linear system using a genetic algorithm
Published 2004“…The results show that the proposed algorithm can be employed as an algorithm to select the structure of the proposed model.…”
Get full text
Get full text
Article -
4
Study Of Modified Training Algorithm For Optimized Convergence Speed Of Neural Network
Published 2016“…First proposed algorithm is the combination of momentum algorithm with adaptive learning rate (ALR) algorithm, and second proposed algorithm is the combination of momentum algorithm with automatic learning rate selection (ALRS) algorithm. …”
Get full text
Get full text
Thesis -
5
-
6
Model structure selection for a discrete-time non-linear system using a genetic algorithm
Published 2004“…The results show that the proposed algorithm can be employed as an algorithm to select the structure of the proposed model.…”
Get full text
Get full text
Article -
7
Group formation using genetic algorithm
Published 2009“…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
8
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
Get full text
Get full text
Thesis -
9
System identification using Extended Kalman Filter
Published 2017“…Besides, Extended Kalman Filter (EKF) algorithm was selected in this project as an algorithm for offline estimation data purposes. …”
Get full text
Get full text
Student Project -
10
-
11
Modified firefly algorithm for directional overcurrent relay coordination in power system protection / Muhamad Hatta Hussain
Published 2020“…This thesis presents Modified Firefly Algorithm for Directional Overcurrent Relay Coordination in Power System Protection. …”
Get full text
Get full text
Thesis -
12
Parallel computation of maass cusp forms using mathematica
Published 2013“…This parallel programme is further modified using a generalized Hejhal’s algorithm to cater for fundamental domain that has several cusps namely the principal congruence subgroup of level two. …”
Get full text
Get full text
Thesis -
13
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
Get full text
Get full text
Get full text
Academic Exercise -
15
Modified ant colony optimization algorithms for deterministic and stochastic inventory routing problems / Lily Wong
Published 2018“…The computational results also show that the algorithms of population based ACO performs better than the algorithms of non-population based ACO. …”
Get full text
Get full text
Get full text
Thesis -
16
Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring
Published 2021“…The prototype is constructed through software and hardware development and has been programmed using Arduino IDE software. An algorithm for selecting communication system is developed by comparing Received Signal Strength Indicator (RSSI) of Wi-Fi and GSM with the priority given to Wi-Fi, followed by GSM and RF. …”
Get full text
Get full text
Thesis -
17
An evaluation of Monte Carlo-based hyper-heuristic for interaction testing of industrial embedded software applications.
Published 2020“…Hyper-heuristic is a new methodology for the adaptive hybridization of meta-heuristic algorithms to derive a general algorithm for solving optimization problems. …”
Get full text
Get full text
Get full text
Article -
18
A Malay Chatterbot
Published 2005“…The chatterbot will be developed using AIML (Artificial Intelligence Markup Language) which is an XML specification for programming chat robots. AIML is open source software, a great advantage for the project since the software can be freely used and, if necessary, modified. …”
Get full text
Get full text
Final Year Project -
19
Friendship Degree and Tenth Man Strategy: A new method for differentiating between erroneous readings and true events in wireless sensor networks
Published 2023“…The second stage will validate the voting process through a novel perspective based on the TMS. TMS will check the voters’ replies based on the event’s location. …”
Get full text
Get full text
Article -
20
