Search Results - (( data location based algorithm ) OR ( parallel estimation method algorithm ))
Search alternatives:
- parallel estimation »
- estimation method »
- method algorithm »
- data location »
-
1
Parallel visualization approach of a 3D heart model
Published 2008Get full text
Get full text
Conference or Workshop Item -
2
Digital quadrature compensators scheme for analog imperfections of quadrature modulator in wireless communication systems
Published 2016“…Offline on the other hand, is a mode where adaptive algorithms cannot estimate the imperfections in parallel with the transmission. …”
Get full text
Get full text
Thesis -
3
-
4
Extreme learning machine for user location prediction in mobile environment
Published 2011“…Design/methodology/approach – Prediction approach to location determination based on historical data has attracted a lot of attention in recent studies, the reason being that it offers the convenience of using previously accumulated location data to subsequently determine locations using predictive algorithms. …”
Get full text
Get full text
Get full text
Article -
5
Extreme learning machine for user location prediction in mobile environment
Published 2011“…Design/methodology/approach – Prediction approach to location determination based on historical data has attracted a lot of attention in recent studies, the reason being that it offers the convenience of using previously accumulated location data to subsequently determine locations using predictive algorithms. …”
Get full text
Get full text
Get full text
Article -
6
Location based services of nearest petrol station using asymmetric key algorithm / Muhammad Awwab Mohd Amdan
Published 2014“…Location-based applications enabled by advances in sensing and tracking technology but it also create significant privacy risks. …”
Get full text
Get full text
Thesis -
7
Algorithm optimization and low cost bit-serial architecture design for integer-pixel and sub-pixel motion estimation in H.264/AVC / Mohammad Reza Hosseiny Fatemi
Published 2012“…This thesis is concerned with algorithm optimization and efficient low cost architecture design for integer motion estimation (IME) and sub-pixel motion estimation (SME) of H.264/AVC. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Early detection of breast cancer using wave elliptic equation with high performance computing
Published 2008“…This paper focuses on the implementation of parallel algorithm for the simulation of breast cancer tumor using two dimensional Helmholtz’s wave equation on a distributed parallel computer system (DPCS). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Finding the optimal road routes between two locations in East Kuala Lumpur by using A* Algorithm based on GPS data / Ilina Syazwani Musa
Published 2007“…The research efforts have been done over the years by the researchers around the world by using a number of different algorithms and different cases study. In this paper, we will use A* algorithm in road route in East Kuala Lumpur based on GPS data on the Garmin platform. …”
Get full text
Get full text
Thesis -
10
-
11
Implementing Location-Based Cryptography on Mobile Application Design to Secure Data in Cloud Storage
Published 2024journal::journal article -
12
Particle filter approach for tracking indoor user location using IEEE 802.11 signals
Published 2011“…The paper discussed the comparison between the true location and the estimated location based on two types of signals data: normal data and noise data. …”
Get full text
Get full text
Get full text
Article -
13
Extreme air pollutant data analysis using classical and Bayesian approaches
Published 2015“…MTM algorithm is an extension of MH algorithm, designed to improve the convergence of MH algorithm by performing parallel computation. …”
Get full text
Get full text
Thesis -
14
Indoor positioning using weighted magnetic field signal distance similarity measure and fuzzy based algorithms
Published 2021“…There is a high chance that a similar reading of those three components obtained at multiple locations. A magnetic-based positioning algorithm should fully utilise the three components of the magnetic field intensity data. …”
Get full text
Get full text
Thesis -
15
Particle filter approach for estimating indoor mobile user location using IEEE 802.11 signals (F1090)
Published 2011“…The paper discussed the comparison between the true location and the estimated location based on two types of signals data: normal data and noise data. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
Image reconstruction using iterative transpose algorithm for optical tomography
Published 2007“…This paper describes a transpose algorithm for use with an optical tomography system. …”
Get full text
Get full text
Get full text
Article -
17
Three phase fault algorithm in distribution system by using database approach and impedance based method
Published 2012“…A three phase fault location algorithm using database and impedance based method is utilized in distribution system to locate fault which may occur in any possible fault sections and to optimize the switching operations to reduce the outage time affected by fault. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant
Published 2007“…In this research, a vision system algorithm has been developed to identify and locate base of young corn trees based upon robot vision technology, pattern recognition techniques, and knowledge-based decision theory. …”
Get full text
Get full text
Thesis -
19
Off-the-shelf indoor localization system using radio frequency for wireless local area network
Published 2018“…In this research, a fingerprinting-based location algorithm is applied in indoor environments using WLAN. …”
Get full text
Get full text
Thesis -
20
Enhanced privacy protection from location dependent attacks in location based services using spatial cloaking
Published 2020“…This paper presents a solution to protect users from location-dependent attacks by improving the existing clique based cloaking algorithm. …”
Get full text
Get full text
Get full text
Article
