Search Results - (( user validation study algorithm ) OR ( java location based algorithm ))

Refine Results
  1. 1
  2. 2

    Group formation using genetic algorithm by Che Ani, Zhamri, Husin, Mohd Zabidin, Yasin, Azman

    Published 2009
    “…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  3. 3

    Multi-floor indoor location estimation system based on wireless local area network by Chua, Tien Han

    Published 2007
    “…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi by Rahimi, Ahmad Faris

    Published 2017
    “…In the implementation phase, Bubble Sort, Euclidean Distance, 10-Fold Cross validation, and K Nearest Neighbor algorithm are developed. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Text Extraction Algorithm for Web Text Classification by Theab, Mustafa Muwafak

    Published 2010
    “…This study provides a text extraction algorithm for web text classification. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Effects of user selected conditions on modeling of dynamic systems using adaptive fuzzy model by Yaacob, Mohd. Shafiek, Jamaluddin, Hishamuddin

    Published 2001
    “…The implementation and the computational aspects of the training algorithm are also highlighted. Three examples of discrete-time nonlinear systems are used in the simulation study to show the effects of user selected conditions on the identification process. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Influence maximisation towards target users on social networks for information diffusion by Temitope, Olanrewaju Abdus-Samad, Ahmad, Rahayu, Mahmuddin, Massudi

    Published 2018
    “…Influence maximisation has been an area of active research in recent years.This study aims to extend the fundamental influence maximisation problem (IMP) with respect to a set of target users on a social network.It is important to aim at the target users to speed up the rate of information diffusion and reduce the information diffusion cost.In doing so, the MITU algorithm was formulated and compared with state of the art algorithms.Publicly available datasets were used in validating the proposed algorithm.It was found that the MITU identified all target nodes while significantly lowering the information diffusion cost function (IDCF) by up to 79%.The influence overlap problem was equally identified in the heuristic algorithm where the seed set size was reduced by an average of six times.Furthermore, the random influencer selection identifies target nodes better than the betweenness and PageRank centralities.The findings could help organisations to reach target users on social media in the shortest cycle.…”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Influence maximization towards target users on social networks for information diffusion by Temitope, Olanrewaju Abdus-Samad, Ahmad, Rahayu, Mahmuddin, Massudi

    Published 2018
    “…In doing so, the MITU algorithm was formulated and compared with state of the art algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  12. 12

    User interface and interactivity design guidelines of algorithm visualization on mobile platform by Supli, Ahmad Affandi

    Published 2019
    “…In terms of artifact, this study yields AVOMP design guidelines that are comprised of UI design and interactivity aspects as well as AVOMP prototype of sorting algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15

    Development of web-based GIS for traffic management system with obstacle avoidance technique using open source software by Nik Yusoff, Nik Mohd Ramli

    Published 2014
    “…In order to calculate the shortest path between two nodes, Dijkstra algorithm was utilized. Obstacle avoidance technique was implemented in this algorithm to avoid the congested areas. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Interactive framework for dynamic modelling and active vibration control of flexible structures by Mat Darus, Intan Zaurah, Mohd. Hashim, Siti Zaiton, Tokhi, M. O.

    Published 2008
    “…This paper presents the implementation of an interactive learning environment for dynamic simulation and active vibration control of flexible structures. The study attempts to facilitate the learning process of the subject area through the development of an interactive environment that can help users to simulate and visualise the behaviour of flexible structures with given physical characteristics, and to test and validate controller designs. …”
    Get full text
    Get full text
    Article
  17. 17

    A pilot study on the validation of vis-screen mobile application for vision test by Abdul Mutalib, Othman, Nyi Nyi, Naing, Atif Amin, Baig

    Published 2020
    “…This pilot study revealed the application is highly potential to be a valid and reliable tool for vision screening in the community.…”
    Get full text
    Get full text
    Article
  18. 18

    Trend analysis of software engineering scientific publications by Tengku Nadzirah, Tengku Majani

    Published 2019
    “…The estimation of the future trend is done by development of the algorithm linear regression algorithm in Matlab. With data collected from the main Science Direct database with of Software Engineering keywords, validation of the proposed algorithms on the case study was done. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  19. 19

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…The system will automatically check for the nearest vacant bay and reserve it for the current user allowing a different bay reservation for the next user. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Energy-efficient power allocation for downlink non orthogonal multiple access networks based on game theory and genetic algorithm / Reem Mustafa Mah’d Al Debes by Reem Mustafa , Mah’d Al Debes

    Published 2025
    “…Additionally, it reduces outage probability by 25% and 10% relative to OMA and existing NOMA algorithms, respectively. These results validate the algorithm's robustness, particularly under imperfect CSI conditions, where traditional methods often fail. …”
    Get full text
    Get full text
    Get full text
    Thesis