Search Results - (( _ location based algorithm ) OR ( its application using (algorithmic OR algorithms) ))*

Search alternatives:

Refine Results
  1. 1
  2. 2

    Edge Detection Algorithm For Image Processing Of Search And Rescue Robot by A/L Sivem, Prasanthran

    Published 2016
    “…Subsequently, Canny edge detection algorithm is selected as an efficient algorithm based on the comparison made and it is further used in this project. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    Genetic algorithm based method for optimal location placement of flexible ac transmission system devices for voltage profile improvement by Karami, Mahdi

    Published 2011
    “…This thesis present a genetic algorithm based method for placement of FACTS devices for voltage profile improvement. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Restaurant locator using Djikstra Algorithm / Mohamad Aliff Hakimi Lukman Hakim by Lukman Hakim, Mohamad Aliff Hakimi

    Published 2017
    “…This route-finding problem is one of the most important computer applications in the transportation industry. In network theory, it’s known as the shortest-path problem, and Dijkstra’s algorithm is usually used to solve it. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Opposition-based spiral dynamic algorithm with an application to optimize type-2 fuzzy control for an inverted pendulum system by Nasir, Ahmad Nor Kasruddin, Abdul Razak, Ahmad Azwan

    Published 2022
    “…Spiral Dynamic Algorithm (SDA) is a group-based optimization algorithm formulated based on the concept of a natural spiral phenomenon on earth. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Path planning for constant speed robot by Abdullah @ Idris, Ahmad Takiyuddin

    Published 2006
    “…The purpose of this thesis is initially to present an implementation of a guidance algorithm based on the geometrical analysis for the adoption of path planning problem. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Data clustering using the bees algorithm by Pham, D.T, Otri, S., Afify, A., Mahmuddin, Massudi, Al-Jabbouli, H.

    Published 2007
    “…The authors’ team have developed a new population based search algorithm called the Bees Algorithm that is capable of locating near optimal solutions efficiently. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    An Adaptive Switching Cooperative Source Searching And Tracing Algorithms For Underwater Acoustic Source Localization by Majid, Mad Helmi Ab.

    Published 2019
    “…To adaptively switches between the two algorithms, an adaptive switching algorithm based on a Generalized Likelihood Ratio Test (GLRT) is proposed. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Enhanced Privacy Protection Against Location-Dependent Attacks in Location Based Services Using Spatial Cloaking by Saravanan, Perumal Shanthi, Balasundaram, Sadhu Ramakrishnan

    Published 2020
    “…This paper presents a solution to protect users from location-dependent attacks by improving the existing clique based cloaking algorithm. …”
    Get full text
    Get full text
    Article
  11. 11

    Enhanced privacy protection from location dependent attacks in location based services using spatial cloaking by Saravanan, Perumal Shanthi, Balasundaram, Sadhu Ramakrishnan

    Published 2020
    “…Use of Internet enabled mobile devices has facilitated the rapid development of location-based services (LBS). …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Home buyer assistant using artificial bee colony algorithm / Muhammad Izzat Azri Azman by Azman, Muhammad Izzat Azri

    Published 2017
    “…This project used Artificial Bee Colony Algorithms (ABC) by adapting the food foraging behaviour of bee in honey bee and find a suitable house for home buyer based on their requirement. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
    Get full text
    Get full text
    Thesis
  15. 15

    Pengesanan nombor plat kenderaan menggunakan alkhwarizmi gugusan dan kelancaran jarak larian(GKJL) by Siti Norul Huda Sheikh Abdullah, Marzuki Khalid, Khairuddin Omar, Rubiyah Yusof

    Published 2009
    “…A new algorithm called Cluster Run Length Smoothing Algorithm (CRLSA) approach was applied to locate the license plate at the right position. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Solving vehicle routing problem by using improved K-nearest neighbor algorithm for best solution by Mohammed, Mazin Abed, Abd Ghani, Mohd Khanapi, Hamed, Raed Ibraheem, A. Mostafa, Salama, Ahmed Ibrahim, Dheyaa, Jameel, Humam Khaled, Alallah, Ahmed Hamed

    Published 2017
    “…Approach: The approach has been presented based on two phases: firstly, the algorithms have been adapted to solve the research problem, where its procedure is different than the common algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    An enhanced distance vector-hop algorithm using new weighted location method for wireless sensor networks by Han, Fengrong, Izzeldin Ibrahim, Mohamed Abdelaziz, Liu, Xinni, Kamarul Hawari, Ghazali

    Published 2020
    “…In the final phase, least squares are employed to address nonlinear equation, which will gain greater location errors. Aimed at addressing problems mentioned above, an enhanced DV-Hop algorithm based on weighted factor, along with new weighted least squares location technique, is proposed in this paper, and it is called WND-DV-Hop. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    A fault syndromes simulator for random access memories by Wan Hasan, Wan Zuha, Abdul Halim, Izhal, Mohd Sidek, Roslina, Othman, Masuri

    Published 2008
    “…This algorithm also allows the faults to be located and identified. …”
    Get full text
    Get full text
    Article
  19. 19

    New approach of cryptography algorithm for e- mail applications by Khmag, Asem, Babiker, Elsadig, Ramli, Abd Rahman

    Published 2005
    “…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Off-the-shelf indoor localization system using radio frequency for wireless local area network by Alhammadi, Abdulraqeb Shaif Ahmed

    Published 2018
    “…In this research, a fingerprinting-based location algorithm is applied in indoor environments using WLAN. …”
    Get full text
    Get full text
    Thesis