Search Results - (( code ((application based) OR (location based)) algorithm ) OR ( _ application kano algorithm ))*

Refine Results
  1. 1

    Automated data process in participatory sensing using QR-code and EAN-13 barcode by Che Ya, Mohamad Fakhrul Syafiq

    Published 2018
    “…The enhanced algorithm was evaluated using a developed prototype which is an Android mobile application of a crowdsourcing data submission based on product price and information, WE+Price, in which, the algorithm was embedded. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Design of information hiding algorithm for multi-link network transmission channel by Fu, Songyin, Wang, Rangding

    Published 2019
    “…Traditional channel information hiding algorithms based on m-sequence for multi-link network transmission, which apply m-sequence to channel coding information hiding system, do not analyze the upper limit of hiding capacity of multi-link network transmission channel system, and do not consider the hidden danger of overlapping secret information when embedding secret information is too large. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Optimization of the Jakim halal logo placement on qr code using enhanced genetic algorithm by Rohani, Fuaad

    Published 2018
    “…The thesis proposed a method to place a logo on top of the QR code, embedded with high data capacity, using Genetic Algorithm (GA) search technique to find appropriate size and location so the QR code can be decoded by various QR code decoders. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    A new corner detection algorithm for chain code representation. by Haron , Habibollah, Shamsuddin , Siti Mariyam, Mohamed, Dzulkifli

    Published 2005
    “…The algorithm is based on chain-coded image, deriving the slope between each code, analyze the series of chain code, and finally decide the existence of corner at the current pixel location. …”
    Get full text
    Get full text
    Article
  7. 7

    An Adaptive Error Correction Scheme For Synchronous Digital Hierarchy-Based Wavelength Division Multiplexed Optical Network by Cheah, Cheng Lai

    Published 2007
    “…A new technique is also proposed for estimation of the error pattern so that a suitable type of code can be assigned accordingly. This technique is based on the analysis of the corrected error locations, referred to as the error location analysis (ELA). …”
    Get full text
    Get full text
    Thesis
  8. 8

    Framework for location based attendance system by using fourth industrial revolution (4ir) technologies by Ali, Azhar, Koondhar, Muhammad, Depar, Mansoor Hyder, Maher, Zulfikar Ahmed, Rind, Muhammad Malook, Shah, Asadullah

    Published 2021
    “…The designed framework used triple authentication i.e. biometric authentication, QR-code authentication, and location based authentication that reduced the risk of prone attendance.…”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Development of an augmented reality based facility layout planning and optimization / Tan Chee Hau by Tan , Chee Hau

    Published 2020
    “…FLP’s research can be divided into the procedural approach, algorithmic approach, Virtual Reality (VR) and AR-based approaches. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Optimization in active vibration control: virtual experimentation using COMSOL multiphysics - MATLAB integration by Md Nor, Khairul Affendy, Abdul Muthalif, Asan Gani, Wahid, Azni N.

    Published 2014
    “…Ant colony optimization algorithm is employed for this purpose. Instead of using equation-based modeling for the system, the plant is a finite element model developed in COMSOL Multiphysics software, which later interfaced with the MATLAB-coded optimization algorithm using the Livelink for MATLAB feature. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  12. 12
  13. 13

    Augmented feedforward and feedback control of a twin rotor system using real-coded MOGA by Toha, Siti Fauziah, Tokhi, M. O.

    Published 2010
    “…Therefore real-coded multi objective genetic algorithm is employed in this work to compromise the problems and determine a set of solutions for the amplitudes and corresponding time locations of impulses on an extra sensitive (EI), four-impulse sequence command shaper as well as gain parameters for the PID controller. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14

    Regionalization by fuzzy expert system based approach optimized by genetic algorithm. by Chavoshi, Sattar, Sulaiman, Wan Nor Azmin, Saghafian, Bahram, Sulaiman, Md. Nasir, Abd Manaf, Latifah

    Published 2013
    “…In order to investigate the homogeneity (h) of catchments and overcome incompatibility that may occur on boundaries of cluster groups, a fuzzy expert system (FES) approach is used which incorporates physical and climatic characteristics, as well as flood seasonality and geographic location. Genetic algorithm (GA) was employed to adjust parameters of FES and optimize the system. …”
    Get full text
    Get full text
    Article
  15. 15

    Development of FRID based 2d localization simulation for autonomous guided vehicle tracking in indoor environment by Al Hazza, Muataz Hazza Faizi, Zainal, Nur Izzati Zainal, Rodzi, Mohd Zuhaili Mohd

    Published 2018
    “…Based from the data collected, the results show that the distance is computed experimentally and theoretically resulted average errors of 4.00 % and the AGV locations is measured from the calculated distance using trilateration algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2015
    “…In this method, permission-based features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Pemetaan Pm10 Dan Aot Menggunakan Teknik Penderiaan Jauh Di Semenanjung Malaysia by San, Limhwee

    Published 2006
    “…The objective of this study is to develop an algorithm based on the aerosol optical thickness (AOT) for mapping PM1 0 using digital camera and satellite imageries. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20