Search Results - (( _ application need algorithm ) OR ( based location model algorithm ))*

Refine Results
  1. 1
  2. 2

    Agreement options for negotiation on material location decision of housing development by Utomo, C., Rahmawati, Y.

    Published 2020
    “…A trade-off algorithm among decision-maker preference is needed for negotiation process. …”
    Get full text
    Get full text
    Article
  3. 3

    AUTOMATIC ROUTE FINDER FOR NEW VISITORS by ADNAN, MOHD SHIHAM

    Published 2006
    “…This project proposes a new visitor route model that is based on shortest path algorithms for road networks. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    Development of improved metaheuristic algorithms for modelling and control of a flexible manipulator system by Nasir, Ahmad Nor Kasruddin, Ahmad, Mohd Ashraf, Raja Ismail, R. M.T., Muhammad Hamka, Embong

    Published 2019
    “…The developed algorithms are formulated based on a spiral model approach and a sine model approach. …”
    Get full text
    Get full text
    Research Report
  5. 5

    Outdoor User Location over 802.11 Ad-hoc Network by Roslan, Mohd Azrik

    Published 2006
    “…At the end of this work, the site testing has validated that this algorithm can be used to determine the user location in outdoor environment with considerable accuracy.…”
    Get full text
    Get full text
    Final Year Project
  6. 6

    Optimization of multipurpose reservoir operation using evolutionary algorithms / Mohammed Heydari by Mohammed , Heydari

    Published 2017
    “…The described model was resolved by linear programming and evolutionary algorithms in Microsoft Excel (Solver). …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…Today security is the important thing that we need to transfer data from location to another safely. …”
    Get full text
    Get full text
    Thesis
  8. 8

    New approach of cryptography algorithm for e- mail applications by Khmag, Asem, Babiker, Elsadig, Ramli, Abd Rahman

    Published 2005
    “…The purpose of this paper is to introduce and demonstrate a new algorithm for Internet and e-mail security. The purposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Reliably optimal PMU placement using disparity evolution-based genetic algorithm by Matsukawa, Yoshiaki, Othman, Mohammad Lutfi, Watanabe, Masayuki, Mitani, Yasunori

    Published 2017
    “…Optimal PMU Placement (OPP) problem as the combinatorial optimization problem has been formulated to determine the minimum PMU location in the power system. In this paper, Disparity Evolution-type Genetic Algorithm (DEGA) based on disparity theory of evolution is applied. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Development of an augmented reality based facility layout planning and optimization / Tan Chee Hau by Tan , Chee Hau

    Published 2020
    “…FLP’s research can be divided into the procedural approach, algorithmic approach, Virtual Reality (VR) and AR-based approaches. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Mobile application for blood donation using geolocation and rule-based algorithm / Muhammad Firzan Azrai Nuzilan and Mohd Ali Mohd Isa by Nuzilan, Muhammad Firzan Azrai, Mohd Isa, Mohd Ali

    Published 2021
    “…The geolocation technology was chosen to help the blood donor or people who need the blood to know the location of people who need the blood and blood donor. …”
    Get full text
    Get full text
    Get full text
    Book Section
  12. 12

    Locust- inspired meta-heuristic algorithm for optimising cloud computing performance by Fadhil, Mohammed Alaa

    Published 2023
    “…The problem is modelled as a set of events that locates an appropriate VM on which to allocate the cloudlet. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Outdoor User Location over Ad-hoc WLAN by Roslan, Mohd Azrik, Yahya, Norashikin, Badruddin , Nasreen

    Published 2007
    “…The separation distances are estimated based on the received signal strength and the radio propagation model for each wireless network car. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Outdoor User Location over Ad-hoc WLAN by Roslan, Mohd Azrik, Yahya, Norashikin, Badruddin , Nasreen

    Published 2007
    “…The separation distances are estimated based on the received signal strength and the radio propagation model for each wireless network car. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar by Seyed Alireza, Ravanfar

    Published 2017
    “…To demonstrate the validity and accuracy of the methods, numerical and experimental studies are conducted on a beam element and subsequently on a three-story building model. Results indicate that the wavelet-based damage detection method precisely identified the location and severity of damages even without reference data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Evaluation Of Different Peak Models Of Eye Blink Eeg For Signal Peak Detection Using Artificial Neural Network by Asrul, Adam, Zuwairie, Ibrahim, Mohd Ibrahim, Shapiai, Marizan, Mubin

    Published 2016
    “…In this study, performance evaluation of the existing peak models is conducted based on Artificial Neural Network (ANN) with particle swarm optimization (PSO) as learning algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Modeling flood occurences using soft computing technique in southern strip of Caspian Sea Watershed by Borujeni, Sattar Chavoshi

    Published 2012
    “…In recent years soft computing methods like fuzzy logic and genetic algorithm are being used in modeling complex processes of hydrologic events. …”
    Get full text
    Get full text
    Thesis
  19. 19

    An Electrocardiogram-Based Authentication Protocol In Wireless Body Area Network by Ramli, Sofia Najwa

    Published 2016
    “…The proposed model is developed and simulated on Matlab based on an improved fuzzy vault scheme with a lightweight error correction algorithm to reduce the computational complexity when compared to previous work. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Adaptive linux-based TCP congestion control algorithm for high-speed networks by Alrshah, Mohamed A.

    Published 2017
    “…Moreover, it shows higher efficiency and stability than the compared CCAs, especially in the cases of big buffers which cause an additional delay. Fundamentally, TCP-based applications naturally need to deal with links of anydistance without the need of human reconfiguration. …”
    Get full text
    Get full text
    Thesis