Search Results - (( based ((application use) OR (application a)) algorithm ) OR ( some applications out algorithm ))
Search alternatives:
- some applications »
- applications out »
- application use »
- application a »
- out algorithm »
-
1
On density-based data streams clustering algorithms: A survey
Published 2017“…Due to data streams characteristics, the traditional density-based clustering is not applicable. Recently, a lot of density-based clustering algorithms are extended for data streams. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Adaptive beamforming algorithm based on Simulated Kalman Filter
Published 2017“…Some of the metaheuristic algorithms have been modified from the original algorithms to improve the algorithms performance in adaptive beamforming application. …”
Get full text
Get full text
Thesis -
3
Map navigation for mobile tourist / Rohana Abd Jalil
Published 2007“…This system is used an rule base algorithm to get an output. The result of this system is come out with the prototype system that adapts the rule base algorithm. …”
Get full text
Get full text
Thesis -
4
-
5
Simulated Kalman Filter: A Novel Estimation-based Metaheuristic Optimization Algorithm
Published 2016Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Immune-based technique for undergraduate programmes recommendation / Muhammad Azrill Mohd Zamri
Published 2017“…The right determination of an undergraduate programme selection by applicants is not an easy task. Some applicants who enrolled for unsuitable programme ended up failed to progress or dropped out from the programme. …”
Get full text
Get full text
Thesis -
7
-
8
Dynamic replication algorithm in data grid: Survey
Published 2008Get full text
Get full text
Get full text
Book Section -
9
-
10
Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli
Published 2021“…The main goal of this study is to create an online food ordering app using the corresponding Boyer-Moore string matching algorithm. …”
Get full text
Get full text
Thesis -
11
Estimation-based Metaheuristics: A New Branch of Computational Intelligence
Published 2016Get full text
Get full text
Conference or Workshop Item -
12
-
13
Liquid Flow Enhancement using Natural Polymeric Additives: Effect of Concentration
Published 2016Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Development of heuristic methods based on genetic algorithm (GA) for solving vehicle routing problem
Published 2008“…Based on the proposed heuristic method, we developed a program to optimize the routing problem using the Visual Studio C++ 6.0 programming language.…”
Get full text
Get full text
Monograph -
15
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…In this study, a new algorithm is proposed to represent an enhanced version of content-based recommender systems by utilizing social networking features. …”
Get full text
Get full text
Thesis -
16
Storify : Protecting privacy of social media post with hash-based anonymity
Published 2022“…The objectives of this project are to investigate a lightweight hash-based anonymity algorithm in protecting the privacy of social media post, in terms of computation speed and ciphertext size, to design and develop the proposed Storify mobile social media application by using prototype development approach and to evaluate the performance of the developed Storify mobile social media application by using System Usability Scale (SUS) approach. …”
Get full text
Get full text
Get full text
Academic Exercise -
17
Vision Based Calibration and Localization Technique for Video Sensor Networks
Published 2009“…Very few of these localization algorithms use vision based technique. In this work, a vision based technique is proposed for localizing and configuring the camera nodes in video wireless sensor networks. …”
Get full text
Get full text
Thesis -
18
-
19
Web application vulnerabilities detection model
Published 2016“…In addition, the proposed detection model will be able to generate the report regarding the level of vulnerability of the web application. The research will be carried out by using design string matching algorithm. …”
Get full text
Get full text
Research Reports -
20
