Search Results - (( processes specifications method algorithm ) OR ( java location based algorithm ))
Search alternatives:
- processes specifications »
- specifications method »
- method algorithm »
- java »
-
1
-
2
Group formation using genetic algorithm
Published 2009“…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
3
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
Get full text
Get full text
Thesis -
4
-
5
Overview of metaheuristic: classification of population and trajectory
Published 2010“…An algorithm that applies a metaheuristic method is used when there are no specific methods to find a solution. …”
Get full text
Get full text
Monograph -
6
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
Get full text
Get full text
Get full text
Academic Exercise -
8
A harmony search algorithm for university course timetabli
Published 2012“…The major thrust of this algorithm lies in its ability to integrate the key components of population-based methods and local search-based methods in a simple optimization model. …”
Get full text
Get full text
Get full text
Article -
9
Fuzzy modeling of brain tissues in Bayesian segmentation of brain MR images
Published 2010“…A two-fold fuzzy segmentation algorithm based on Bayesian method is proposed in this paper. …”
Get full text
Get full text
Conference or Workshop Item -
10
A partition based feature selection approach for mixed data clustering / Ashish Dutt
Published 2020“…This implies that a pre-processing algorithm has to be enforced first and only then some specific data mining methods can be applied to the problems. …”
Get full text
Get full text
Get full text
Thesis -
11
Genetic algorithm based for optimizing filter design / Rohana Awang Ahmed
Published 2000“…There is also possibility that the design does not meet specification thus forcing the process to be repeated. …”
Get full text
Get full text
Thesis -
12
Novel techniques for enhancement and segmentation of acne vulgaris lesions
Published 2013“…The proposed segmentation method shows higher sensitivity and specificity than other methods. …”
Get full text
Get full text
Get full text
Citation Index Journal -
13
Fast temporal video segmentation based on Krawtchouk-Tchebichef moments
Published 2020“…To increase the speed of the TVS algorithm as well as the accuracy, fast block processing and embedded orthogonal polynomial algorithms are utilized to extract features. …”
Get full text
Get full text
Get full text
Article -
14
-
15
Adaptive interference canceller using analog algorithm with offset voltage
Published 2015“…LMS and NLMS algorithms have been used in a wide range of signal processing applications because of their simplicity in computations compared to the RLS algorithm. …”
Get full text
Get full text
Thesis -
16
A study on channel coding for 5G / Xu Wei
Published 2019“…In addition, the performances of Polar code under different decoding algorithms and different construction method are simulated and compared. …”
Get full text
Get full text
Get full text
Thesis -
17
STUDIES ON COMPARISON OF PROPORTIONAL ON ERROR WITH PROPORTIONAL ON MEASURED VALUE IN PID CONTROLLERS
Published 2019“… PID Controllers have different algorithms or methods in which the controller action is based on Error or Process Variable (PV). …”
Get full text
Get full text
Final Year Project -
18
Fingerprint recognition using neural networks / Kennie Yeoh Eng Hoe
Published 2001“…Traditional methods of fingerprint verification uses either complicated feature detection algorithms that are not specific to each fingerprint, or compare two fingerprint images directly using image processing toots. …”
Get full text
Get full text
Thesis -
19
Towards a unified image quality assessment technique for cross-content image processing applications
Published 2024“…The study’s second objective is to apply IQA practically in image processing applications/operations. It specifically tackles image reconstruction, a vital post-processing task in image systems. …”
Get full text
Thesis -
20
