Search Results - (( based application ((use algorithm) OR (new algorithm)) ) OR ( based location model algorithm ))
Search alternatives:
- based application »
- model algorithm »
- based location »
- location model »
- use algorithm »
- new algorithm »
-
1
Extreme learning machine for user location prediction in mobile environment
Published 2011“…This work examines the location determination techniques by attempting to determine the location of mobile users by taking advantage of SS and SQ history data and modeling the locations using the ELM algorithm. …”
Get full text
Get full text
Get full text
Article -
2
New Algorithm of Location Model based on Robust Estimators and Smoothing Approach
Published 2017Get full text
Get full text
Get full text
Conference or Workshop Item -
3
New approach of cryptography algorithm for e- mail applications
Published 2005“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Conference or Workshop Item -
4
Development of an augmented reality based facility layout planning and optimization / Tan Chee Hau
Published 2020“…FLP’s research can be divided into the procedural approach, algorithmic approach, Virtual Reality (VR) and AR-based approaches. …”
Get full text
Get full text
Get full text
Thesis -
5
Designing new chaotic and hyperchaotic systems for chaos-based cryptography
Published 2019“…To investigate its performance in terms of security, a new chaos-based image encryption algorithm is also proposed. …”
Get full text
Get full text
Thesis -
6
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Thesis -
7
A Novel Hybrid Evolutionary Data-Intelligence Algorithm for Irrigation and Power Production Management: Application to Multi-Purpose Reservoir Systems
Published 2019“…The proposed hybrid modelling method was applied for the multi-purpose reservoir system of Bhadra Dam, which is located in the state of Karnataka, India. …”
Get full text
Get full text
Article -
8
Multi-objective Binary Clonal Selection Algorithm In The Retrieval Phase Of Discrete Hopfield Neural Network With Weighted Systematic Satisfiability
Published 2024“…Based on the findings, the proposed logic mining model outperformed other baseline logic mining models for all the performance metrics used in the repository dataset. …”
Get full text
Get full text
Thesis -
9
Modified ant colony optimization algorithms for deterministic and stochastic inventory routing problems / Lily Wong
Published 2018“…The computational results also show that the algorithms of population based ACO performs better than the algorithms of non-population based ACO. …”
Get full text
Get full text
Get full text
Thesis -
10
User song preferences using preference learning in artificial intelligence
Published 2022“…The most common model is popularity-based model because it is simple and intuitive. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
-
12
Wide area measurement system in the IEEE-14 bus system using multiobjective shortest path algorithm for fault analysis
Published 2021“…The IEEE-14 bus system was modeled in PSCAD software for simulating nineteen types of fault based on multi-objective shortest path algorithm. …”
Get full text
Get full text
Get full text
Article -
13
E-Grocery application with Geolocation and YOLO Algorithm / Ikhwan Nurhakim Zuzalli and Raihana Md Saidi
Published 2021“…The objective of this project is to develop an E-Grocery application using geolocation and YOLO algorithm. The users can store their groceries’ stock in the system using the YOLO algorithm. …”
Get full text
Get full text
Get full text
Book Section -
14
Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani
Published 2016“…The sentences relevance identification module uses a statistical based approach such as vector space model (VSM) to represent sentences and compute similarity between the source sentences and the summary sentences using the cosine similarity measure. …”
Get full text
Get full text
Thesis -
15
Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar
Published 2017“…To demonstrate the validity and accuracy of the methods, numerical and experimental studies are conducted on a beam element and subsequently on a three-story building model. Results indicate that the wavelet-based damage detection method precisely identified the location and severity of damages even without reference data. …”
Get full text
Get full text
Get full text
Thesis -
16
Adaptive linux-based TCP congestion control algorithm for high-speed networks
Published 2017“…The main contributions of this model are: First, to validate the simulation results of AF-based CCA by comparing them to the numerical results of this model and to the results of NewReno as a benchmark. …”
Get full text
Get full text
Thesis -
17
Modeling flood occurences using soft computing technique in southern strip of Caspian Sea Watershed
Published 2012“…In recent years soft computing methods like fuzzy logic and genetic algorithm are being used in modeling complex processes of hydrologic events. …”
Get full text
Get full text
Thesis -
18
AUTOMATIC ROUTE FINDER FOR NEW VISITORS
Published 2006“…This project proposes a new visitor route model that is based on shortest path algorithms for road networks. …”
Get full text
Get full text
Final Year Project -
19
A Salient Based Bag of Visual Word model (SBBoVW): improvements toward difficult object recognition and object location in image retrieval
Published 2016“…To solve this problem, a new Salient Based Bag of Visual Word (SBBoVW) model for object recognition and object location estimation is presented. …”
Get full text
Get full text
Get full text
Article -
20
An Electrocardiogram-Based Authentication Protocol In Wireless Body Area Network
Published 2016“…To enhance the overall performance, this thesis also evaluates the uniqueness and the stability of ECG signal using Independent Component Analysis (ICA) and fast Fourier Transform (FFT) algorithm respectively as the signal is applied as inputs of the proposed ECG-based authentication protocol model. …”
Get full text
Get full text
Get full text
Get full text
Thesis
