Search Results - (( variable creating process algorithm ) OR ( java location based algorithm ))
Search alternatives:
- variable creating »
- process algorithm »
- creating process »
- java »
-
1
-
2
Group formation using genetic algorithm
Published 2009“…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
3
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
Get full text
Get full text
Thesis -
4
To study the multi-objective optimization of EDM using genetic algorithm
Published 2013“…Development of EDM process has resulted in significant improvements in operating techniques, productivity and accuracy, which the result of this machining development has helped variability in EDM process. …”
Get full text
Get full text
Undergraduates Project Papers -
5
-
6
Comparing seabed roughness result from QPS fledermaus software, benthic trrain modeler [BTM] and developed model derived FRM slope variability algorithm for hard coral reef detecti...
Published 2018“…In ArcGlS software, DEM data will be process by using terrain roughness model that has been derived by using Slope Variability algorithm. …”
Get full text
Get full text
Thesis -
7
Message based random variable length key encryption algorithm.
Published 2009“…None fixed size key caused avoidance of replaying and other attacks that can happen on fixed sized key algorithms. Conclusion: Random process employed in this block cipher increased confidentiality of the message and dynamic length substitution in proposed algorithm may lead to maximum cryptographic confusion and consequently makes it difficult for cryptanalysis.…”
Get full text
Get full text
Article -
8
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
Get full text
Get full text
Get full text
Academic Exercise -
10
Test of Self Por [decoded] trait no. 2 / Syafiq Abdul Samat
Published 2021“…Inspired by some of the generative art made via programming, I was able to create my own algorithmic concept, using these “noises” as factors or variables to affect the creation of the proposed visual. …”
Get full text
Get full text
Book Section -
11
Neutralisation state driven single-agent search strategy for solving constraint satisfaction problem / Saajid Akram Ahmed Abuluaih
Published 2019“…For example, the framework of solving CSP imposes a complete permutation of assignments to all remaining variables in order to derive a valid model. The author argues in this study that the problem can be neutralised and it is not necessary to perform brute-force searching all the time if a search strategy could have guided the process to the level where the values of the remaining variables can be determined implicitly, creating what the author calls Solo-Path of assignments in the problem search tree.…”
Get full text
Get full text
Thesis -
12
Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad
Published 2018“…Due to the inherent and uncertain variability of the Harumanis features, fuzzy learning algorithm has been designed to classify these fruits similar to the ability of human experts. …”
Get full text
Get full text
Thesis -
13
-
14
Flame Development Study at Variable Swirl Level Flows in a Stratified CNG DI Combustion Engine using Image Processing Technique
Published 2011Get full text
Get full text
Citation Index Journal -
15
Enhancing Harmony Search Metaheuristic Algorithm for Coverage Efficiency, Test Suite Reduction, and Running Time in Combinatorial Interaction Testing
Published 2025“…The Harmony Search (HS) algorithm is a recent metaheuristic that mimics musicians’ improvisation to create pleasant compositions according to aesthetic standards widely used in different areas continuously adjusts solution variables to find the best outcome. …”
Get full text
Get full text
Article -
16
Friendship Degree and Tenth Man Strategy: A new method for differentiating between erroneous readings and true events in wireless sensor networks
Published 2023“…The second stage will validate the voting process through a novel perspective based on the TMS. TMS will check the voters’ replies based on the event’s location. …”
Get full text
Get full text
Article -
17
The Determinant Factors for the Issuance of Central Bank Digital Currency (CBDC) in Malaysia using Machine Learning Framework
Published 2024“…The overall CentralBank Digital Currency Project Index (CBDCPI) was selected as a target variable,while two machine learning algorithms, Random Forest and XGBoost were utilized to identify the determining variables. …”
Get full text
Get full text
Get full text
Article -
18
New synchronization protocol for distributed system with TCP extension
Published 2013“…Faulty processes may cause some other active processes to become inactive during the queuing or within the using a critical section time. …”
Get full text
Get full text
Thesis -
19
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
20
Passive congregation theory for particle swarm optimization (PSO): An application in reservoir system operation
Published 2023“…Monthly releases are taken as the main objective variables and are essentially control the water deficit of the process. …”
Article
