Search Results - (( variable affecting implementation algorithm ) OR ( java location based algorithm ))
Search alternatives:
- affecting implementation »
- implementation algorithm »
- variable affecting »
- java »
-
1
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…Hence, an inaccurate result for system operators is inevitable as most of the variables affecting the reliability changes with time. …”
Get full text
Get full text
Thesis -
2
-
3
Group formation using genetic algorithm
Published 2009“…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
4
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
Get full text
Get full text
Thesis -
5
-
6
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Image Based Congestion Detection Algorithms And Its Real Time Implementation
Published 2015“…The methodology includes vehicle detection by using backlight pairing feature algorithm and modified Watershed algorithm. The results returned by the algorithms are transmitted and received wirelessly using the SFFSDR platform, including the use of RF, FPGA, and DSP modules for variable distances. …”
Get full text
Get full text
Thesis -
8
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
Get full text
Get full text
Get full text
Academic Exercise -
9
Widely linear dynamic quaternion valued least mean square algorithm for linear filtering
Published 2017“…The new adaptive algorithm is called dynamic quaternion least mean square algorithm (DQLMS) because of the normalization process of the filter input and the variable step-size. …”
Get full text
Get full text
Get full text
Thesis -
10
Solving large-scale problems using multi-swarm particle swarm approach
Published 2018“…The proposed approach strived to scale up the application of the (PSO) algorithm towards solving large-scale optimization tasks of up to 1000 real-valued variables. …”
Get full text
Get full text
Get full text
Article -
11
A NOVEL FORWARD BACKWARD LINEAR PREDICTION ALGORITHM FOR SHORT TERM POWER LOAD FORECAST
Published 2010“…In order to verify the proposed algorithm as a solution to STLF problem, its performance is compared with other AR-based algorithms, like Burg and the seasonal Box-Jenkins ARIMA (SARIMA). …”
Get full text
Get full text
Thesis -
12
Effective use of artificial intelligence by Malaysian manufacturing firms to enable sustainability 4.0
Published 2023“…The purpose is to interpret the implementation of businessanalytic ultimately affects the overall performance of the organization. and creatingafeasible framework. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Friendship Degree and Tenth Man Strategy: A new method for differentiating between erroneous readings and true events in wireless sensor networks
Published 2023“…The second stage will validate the voting process through a novel perspective based on the TMS. TMS will check the voters’ replies based on the event’s location. …”
Get full text
Get full text
Article -
14
Predicting crop yield and field energy output for oil palm using genetic algorithm and neural network models
Published 2019“…There was not enough information available on the implementation of neural networks and genetic algorithm for the prediction and selecting input variables in oil palm yield and output energy. …”
Get full text
Get full text
Thesis -
15
Improvement of land cover mapping using Sentinel 2 and Landsat 8 imageries via non-parametric classification
Published 2020“…However, its precision affected by numerous factors like data set type, spatial resolution, number of variables, etc. …”
Get full text
Get full text
Thesis -
16
Adapting perturbation voltage for variable speed micro-hydro using particle swarm optimization (PSO)
Published 2022“…Results show that the value of perturbation speed affects the performance of MPPT algorithm to search the maximum operating point. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
17
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
18
-
19
Effects of strategic leadership, organizational innovativeness, information technology capability on effective strategy implementation
Published 2017“…Therefore, significant positive effects of SL, OI and ITC suggest that the variables are important in facilitating ESI. As such, public tertiary institutions should be encouraged to demonstrate these behaviours for enhanced success of organizational strategy implementation. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Error concealment technique using wavelet neural network for wireless transmitted digital images
Published 2012“…In the case, where the missing regions of pixels are containing textures, edges, and other image features that are not easily handled by concealment algorithms. It therefore, necessitated to use denoising rather than EC algorithms. …”
Get full text
Get full text
Thesis
