Search Results - (( java location based algorithm ) OR ( variable detection through algorithm ))
Search alternatives:
- variable detection »
- detection through »
- through algorithm »
- java »
-
1
-
2
-
3
Group formation using genetic algorithm
Published 2009“…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
4
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
Get full text
Get full text
Thesis -
5
-
6
Enhancement of Space-Time Receiver Structure with Multiuser Detection for Wideband CDMA Communication Systems
Published 2006“…Multiuser detection and smart antenna technologies are capable of increasing the system capacity through mitigation of such impairment. …”
Get full text
Get full text
Thesis -
7
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
Get full text
Get full text
Get full text
Academic Exercise -
9
Predicting Survey Responses: How and Why Semantics Shape Survey Statistics on Organizational Behaviour
Published 2014“…Some disciplines in the social sciences rely heavily on collecting survey responses to detect empirical relationships among variables. We explored whether these relationships were a priori predictable from the semantic properties of the survey items, using language processing algorithms which are now available as new research methods. …”
Get full text
Get full text
Get full text
Article -
10
DESIGN OF SMART TRAFFIC LIGHT SYSTEM BASED ON INTERNET OF THINGS
Published 2018“…Density of the traffic is calculated by the algorithm that have various variables. This project will use Arduino as it microcontroller and the ultrasonic is used to detect the congestion. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
11
Fuzzy Adaptive Tuning of a Particle Swarm Optimization Algorithm for Variable-Strength Combinatorial Test Suite Generation
Published 2018“…We detail the design of this combined algorithm and evaluate it through experiments on multiple synthetic and benchmark problems. …”
Get full text
Get full text
Get full text
Book Chapter -
12
Modelling and analysis of sensor fault tolerant control using behavioral approach to systems theory
Published 2015“…Mathematical models of the plants are first derived through the description of the manifest behavior by elimination of the latent variables via a systematic algorithm. …”
Get full text
Get full text
Get full text
Thesis -
13
Detection of leak size and its location in a water distribution system by using K-NN / Nasereddin Ibrahim Sherksi
Published 2020“…The successfully achieved four set objectives inclusive of (1) a new classification model to detect water leakage, (2) analysis of the effects of leakage size on the variables within a WDS, i.e. flow, pressure, pipe volume, velocity and water demand, (3) locating and specifying the leakage size in the WDS, and (4) evaluate the performance of the designed K-NN algorithm for accurate leak detection. …”
Get full text
Get full text
Thesis -
14
Analyzing land surface temperature in response to massive urbanization by using single window algorithm in Penang Island / Ainna Naeemah Zainal Abidin
Published 2019“…Next will be the extraction of Land Surface Temperature (LST) by using Spectral Radiance Model and Single Window Algorithm through the satellite imagery. Last objectives will be the analysis on the relationship between the dependent and independent variables that be made through the correlation coefficient analysis. …”
Get full text
Get full text
Thesis -
15
Cross-domain analysis of YOLOv8 and faster R-CNN models for enhanced precision in maritime object detection
Published 2025“…Recent advancements in machine vision, particularly through Convolutional Neural Networks (CNNs), have significantly improved object detection in maritime environments. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
A real-time integrated fire detection and alarm (FDA) system for network based building automation
Published 2017“…The framework shares information through the algorithm and communicates with each fire alarm panels connected in peer to peer configuration to declare the network state in every second using network address. …”
Get full text
Get full text
Get full text
Article -
17
Predicting Cheaters in PlayerUnknown’s Battlegrounds (PUBG) using Random Forest Algorithm
Published 2023“…Patterns and relationships between input variables and cheating behaviours are analysed through the application of supervised learning techniques, specifically a classification model. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
18
Embedded mini-analyzer device for in situ wide range heavy metal identification and concentration detection
Published 2018“…To achieve the ability of in-situ processing of detection, embedded algorithms like digital FIR filter, multiple peaks finding, peaks classification and linear regressions have been implemented on an ARM processor. …”
Get full text
Get full text
Thesis -
19
Heartbeat Anomaly Detection Method Based on Electrocardiogram using Improved Certainty Cognitive Map
Published 2023“…This research has 3 objectives To develop algorithms for detecting heart conditions as either abnormal or normal using the modified cognitive map (CM) approach, To develop detection algorithms for anomalous heart conditions based on the enhancement of Certainty Factor (CF) technique, and To evaluate and validate the effectiveness of the new proposed model specifically the Certainty Cognitive Map (CCM) for identifying heart defects. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Friendship Degree and Tenth Man Strategy: A new method for differentiating between erroneous readings and true events in wireless sensor networks
Published 2023“…The second stage will validate the voting process through a novel perspective based on the TMS. TMS will check the voters’ replies based on the event’s location. …”
Get full text
Get full text
Article
