Search Results - (( data location based algorithm ) OR ( parallel optimization path algorithm ))
Search alternatives:
- parallel optimization »
- optimization path »
- path algorithm »
- data location »
-
1
Tool path generation of contour parallel based on ant colony optimisation
Published 2016“…An Ant Colony Optimisation (ACO) method is used to optimize the tool path length because of its capability to find the shortest tool path length. …”
Get full text
Get full text
Article -
2
Minimizing machining airtime motion with an ant colony algorithm
Published 2016Get full text
Get full text
Article -
3
-
4
Restoration planning strategy of transmission system based on optimal energizing time of sectionalizing islands / Dian Najihah Abu Talib
Published 2019“…There are two discrete optimization techniques used in this work, which are the Artificial Bee Colony algorithm and Evolutionary Programming. …”
Get full text
Get full text
Get full text
Thesis -
5
-
6
Extreme learning machine for user location prediction in mobile environment
Published 2011“…Design/methodology/approach – Prediction approach to location determination based on historical data has attracted a lot of attention in recent studies, the reason being that it offers the convenience of using previously accumulated location data to subsequently determine locations using predictive algorithms. …”
Get full text
Get full text
Get full text
Article -
7
Extreme learning machine for user location prediction in mobile environment
Published 2011“…Design/methodology/approach – Prediction approach to location determination based on historical data has attracted a lot of attention in recent studies, the reason being that it offers the convenience of using previously accumulated location data to subsequently determine locations using predictive algorithms. …”
Get full text
Get full text
Get full text
Article -
8
Location based services of nearest petrol station using asymmetric key algorithm / Muhammad Awwab Mohd Amdan
Published 2014“…Location-based applications enabled by advances in sensing and tracking technology but it also create significant privacy risks. …”
Get full text
Get full text
Thesis -
9
A novel large-bit-size architecture and microarchitecture for the implementation of Superscalar Pipeline VLIW microprocessors
Published 2008“…Different adder architectures are investigated for suitability on synthesis implementation of large data bus size adder for efficient usage within the ALU. An adder algorithm using repetitive constructs in a parallel algorithm that allows for efficient and optimal synthesis for large data bus size is proposed as a suitable implementation for the adder within the ALU. …”
Get full text
Thesis -
10
Finding the optimal road routes between two locations in East Kuala Lumpur by using A* Algorithm based on GPS data / Ilina Syazwani Musa
Published 2007“…The research efforts have been done over the years by the researchers around the world by using a number of different algorithms and different cases study. In this paper, we will use A* algorithm in road route in East Kuala Lumpur based on GPS data on the Garmin platform. …”
Get full text
Get full text
Thesis -
11
-
12
Implementing Location-Based Cryptography on Mobile Application Design to Secure Data in Cloud Storage
Published 2024journal::journal article -
13
Particle filter approach for tracking indoor user location using IEEE 802.11 signals
Published 2011“…The paper discussed the comparison between the true location and the estimated location based on two types of signals data: normal data and noise data. …”
Get full text
Get full text
Get full text
Article -
14
Indoor positioning using weighted magnetic field signal distance similarity measure and fuzzy based algorithms
Published 2021“…There is a high chance that a similar reading of those three components obtained at multiple locations. A magnetic-based positioning algorithm should fully utilise the three components of the magnetic field intensity data. …”
Get full text
Get full text
Thesis -
15
Particle filter approach for estimating indoor mobile user location using IEEE 802.11 signals (F1090)
Published 2011“…The paper discussed the comparison between the true location and the estimated location based on two types of signals data: normal data and noise data. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
Three phase fault algorithm in distribution system by using database approach and impedance based method
Published 2012“…A three phase fault location algorithm using database and impedance based method is utilized in distribution system to locate fault which may occur in any possible fault sections and to optimize the switching operations to reduce the outage time affected by fault. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant
Published 2007“…In this research, a vision system algorithm has been developed to identify and locate base of young corn trees based upon robot vision technology, pattern recognition techniques, and knowledge-based decision theory. …”
Get full text
Get full text
Thesis -
18
Off-the-shelf indoor localization system using radio frequency for wireless local area network
Published 2018“…In this research, a fingerprinting-based location algorithm is applied in indoor environments using WLAN. …”
Get full text
Get full text
Thesis -
19
Enhanced privacy protection from location dependent attacks in location based services using spatial cloaking
Published 2020“…This paper presents a solution to protect users from location-dependent attacks by improving the existing clique based cloaking algorithm. …”
Get full text
Get full text
Get full text
Article -
20
Enhanced Privacy Protection Against Location-Dependent Attacks in Location Based Services Using Spatial Cloaking
Published 2020“…This paper presents a solution to protect users from location-dependent attacks by improving the existing clique based cloaking algorithm. …”
Get full text
Get full text
Article
