Search Results - (( based application ((use algorithm) OR (new algorithm)) ) OR ( based location model algorithm ))

Refine Results
  1. 1

    Extreme learning machine for user location prediction in mobile environment by Mantoro, Teddy, Olowolayemo, Akeem, Olatunji, Sunday O., Ayu, Media Anugerah, Md. Tap, Abu Osman

    Published 2011
    “…This work examines the location determination techniques by attempting to determine the location of mobile users by taking advantage of SS and SQ history data and modeling the locations using the ELM algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    New approach of cryptography algorithm for e- mail applications by Khmag, Asem, Babiker, Elsadig, Ramli, Abd Rahman

    Published 2005
    “…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Development of an augmented reality based facility layout planning and optimization / Tan Chee Hau by Tan , Chee Hau

    Published 2020
    “…FLP’s research can be divided into the procedural approach, algorithmic approach, Virtual Reality (VR) and AR-based approaches. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Designing new chaotic and hyperchaotic systems for chaos-based cryptography by Kadhim, Al Karawi Hayder Natiq

    Published 2019
    “…To investigate its performance in terms of security, a new chaos-based image encryption algorithm is also proposed. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Multi-objective Binary Clonal Selection Algorithm In The Retrieval Phase Of Discrete Hopfield Neural Network With Weighted Systematic Satisfiability by Romli, Nurul Atiqah

    Published 2024
    “…Based on the findings, the proposed logic mining model outperformed other baseline logic mining models for all the performance metrics used in the repository dataset. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Modified ant colony optimization algorithms for deterministic and stochastic inventory routing problems / Lily Wong by Lily , Wong

    Published 2018
    “…The computational results also show that the algorithms of population based ACO performs better than the algorithms of non-population based ACO. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    User song preferences using preference learning in artificial intelligence by Goh, Beng Jun

    Published 2022
    “…The most common model is popularity-based model because it is simple and intuitive. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11
  12. 12

    Wide area measurement system in the IEEE-14 bus system using multiobjective shortest path algorithm for fault analysis by Awalin, Lilik J., Syahirah, Abd Halim, Jafferi, Jamaludin, Nor Azuana, Ramli

    Published 2021
    “…The IEEE-14 bus system was modeled in PSCAD software for simulating nineteen types of fault based on multi-objective shortest path algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    E-Grocery application with Geolocation and YOLO Algorithm / Ikhwan Nurhakim Zuzalli and Raihana Md Saidi by Zuzalli, Ikhwan Nurhakim, Md Saidi, Raihana

    Published 2021
    “…The objective of this project is to develop an E-Grocery application using geolocation and YOLO algorithm. The users can store their groceries’ stock in the system using the YOLO algorithm. …”
    Get full text
    Get full text
    Get full text
    Book Section
  14. 14

    Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani by Seyed Asadollah, Abdiesfandani

    Published 2016
    “…The sentences relevance identification module uses a statistical based approach such as vector space model (VSM) to represent sentences and compute similarity between the source sentences and the summary sentences using the cosine similarity measure. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar by Seyed Alireza, Ravanfar

    Published 2017
    “…To demonstrate the validity and accuracy of the methods, numerical and experimental studies are conducted on a beam element and subsequently on a three-story building model. Results indicate that the wavelet-based damage detection method precisely identified the location and severity of damages even without reference data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Adaptive linux-based TCP congestion control algorithm for high-speed networks by Alrshah, Mohamed A.

    Published 2017
    “…The main contributions of this model are: First, to validate the simulation results of AF-based CCA by comparing them to the numerical results of this model and to the results of NewReno as a benchmark. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Modeling flood occurences using soft computing technique in southern strip of Caspian Sea Watershed by Borujeni, Sattar Chavoshi

    Published 2012
    “…In recent years soft computing methods like fuzzy logic and genetic algorithm are being used in modeling complex processes of hydrologic events. …”
    Get full text
    Get full text
    Thesis
  18. 18

    AUTOMATIC ROUTE FINDER FOR NEW VISITORS by ADNAN, MOHD SHIHAM

    Published 2006
    “…This project proposes a new visitor route model that is based on shortest path algorithms for road networks. …”
    Get full text
    Get full text
    Final Year Project
  19. 19

    A Salient Based Bag of Visual Word model (SBBoVW): improvements toward difficult object recognition and object location in image retrieval by Mansourian, Leila, Abdullah, Muhamad Taufik, Abdullah, Lilli Nurliyana, Azman, Azreen, Mustaffa, Mas Rina

    Published 2016
    “…To solve this problem, a new Salient Based Bag of Visual Word (SBBoVW) model for object recognition and object location estimation is presented. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    An Electrocardiogram-Based Authentication Protocol In Wireless Body Area Network by Ramli, Sofia Najwa

    Published 2016
    “…To enhance the overall performance, this thesis also evaluates the uniqueness and the stability of ECG signal using Independent Component Analysis (ICA) and fast Fourier Transform (FFT) algorithm respectively as the signal is applied as inputs of the proposed ECG-based authentication protocol model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis