Search Results - (( mobile information needs algorithm ) OR ( based optimization steam algorithm ))*

Refine Results
  1. 1

    Neuro-Fuzzy and Particle Swarm Optimization based Model for the Steam and Cooling sections of a Cogeneration and Cooling Plant by Alemu Lemma, Tamiru, Rangkuti, Chalillullah, Mohd Hashim, Fakhruldin

    Published 2009
    “…Neuro-fuzzy approach trained by a sequence of optimization algorithms-Particle Swarm Optimization (PSO) followed by Back-Propagation (BP)-is used to develop models for the steam drum pressure, steam drum water level, steam flow rate and chilled water supply temperature. …”
    Get full text
    Conference or Workshop Item
  2. 2

    Range sensor based local path planning algorithm for mobile robot in unknown static environment with beacon / Wan Ahmad Jailani Wan Ngah by Wan Ngah, Wan Ahmad Jailani

    Published 2013
    “…Implementation of Bug algorithm also requires assumption that the localisation for mobile robot is ideal causes the need for ideal sensor and unrealistic for real mobile robots to be implemented in real world. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Mobile Map-Based Positioning System Using Segmentation Algorithm (MM-BPS) by Migdady, Hazem Moh'd Ali

    Published 2008
    “…The mobile technology was developed to create ubiquitous environment where information can be access at any place and at any time. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    TRIP PLANNER MOBILE APPLICATION FOR SARAWAK TOURIST WITH USING INTELLIGENT AGENT BASED DECISION MAKING ALGORITHMS by Teh, Khee Shin

    Published 2020
    “…Nowadays, technology has become an essential need in almost every aspect of our lives. The internet becomes the main source of information for user to plan the trip. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  5. 5

    Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm by Enshaei, Mehdi

    Published 2015
    “…In this study, a new defence mechanism is proposed based on modification of the packet forwarding process, using Neighborhood Information (NI) and PT algorithm, and known as NIPT algorithm. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A study of mobile IP and its security aspects in a LAN environment / Suhaila Che Ismail by Che Ismail, Suhaila

    Published 1998
    “…When a user needs to use the mobile IP, the home agent and security information are selected. …”
    Get full text
    Get full text
    Thesis
  7. 7

    SYSTEMATIC DESIGN ALGORITHM FOR ENERGY EFFICIENT AND COST EFFECTIVE HYDROGEN PRODUCTION FROM PALM WASTE by INAYAT, ABRAR

    Published 2012
    “…In the current study, a systematic autonomous algorithm incorporating reaction kinetics model, flowsheet calculations, heat integration analysis and economic evaluation, has been developed to calculate optimum parameters giving minimum hydrogen production cost using optimization strategies. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Map navigation for mobile tourist / Rohana Abd Jalil by Abd Jalil, Rohana

    Published 2007
    “…Therefore, there is a need for a development of this system where map navigation mobile tourist guides should be able to cope with positional information of varying quality. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…The significance is to protect personal information and provide future robust security on mobile messaging application. …”
    Get full text
    Get full text
    Student Project
  10. 10

    Comparative study of some symmetric ciphers in mobile systems by Jassim, Khalid Fadhil, Alshaikhli, Imad Fakhri Taha

    Published 2014
    “…Symmetric cryptographic algorithms have been proposed to protect the information of the senders and receivers through mobile systems. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11
  12. 12
  13. 13

    Optimization of stiffened panel fatigue life by using finite element analysis by Mazlan, Shahan

    Published 2020
    “…The multi-objective genetic algorithm which selects the design points based on Pareto optimal design combined with the adaptive multi-objective algorithm method which uses an optimal space-filling was shown to be efficient for time limitation and budget. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Outdoor marker-less tracking and pose calculating system for mobile augmented reality by Rehman, Ullah Khan

    Published 2014
    “…Some researchers use mobile AR browsers but AR browsers don’t have recognition capability and can only use location data to provide information. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Temperature control of a pilot plant reactor system using a genetic algorithm model‐based control approach by Wahab, Ahmad Khairi Abdul, Hussain, Mohd Azlan, Omer, Rosli

    Published 2007
    “…The work described in this paper aims at exploring the use of an artificial intelligence technique, i.e. genetic algorithm (GA), for designing an optimal model-based controller to regulate the temperature of a reactor. …”
    Get full text
    Get full text
    Article
  16. 16

    Text messaging encryption system by Sundara Morthty, Nirmala Devi

    Published 2012
    “…Nowadays,most encryption and decryption processes are done by the computer.The main objective of this project is to build a text encryption and decryption system that will run on a Java enabled mobile phones.Then,the mobile phones will be used as an external means to encrypt text messages.As mentioned earlier,not only computers can encrypt and decrypt text but mobile phones also can encrypt and decrypt text messages.The purpose of this research is to provide security for confidential information to be sent over mobile phones.At the moment there is no security for messages transmitted over mobile phones.Confidential information or instructions can only be safely passed on to the required parties by email or verbally in person.This delays time and efficiency of crucial business operations. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  17. 17

    RSA algorithm performance in short messaging system exchange environment by Mohamad Tahir, Hatim, Madi, Tamer N. N., Husin, Mohd Zabidin, Puteh, Nurnasran

    Published 2011
    “…Short Message Service (SMS) is a widely service for brief communication.With the rise of mobile usage it has become a popular tool for transmitting sensitive information. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Enhanced marking process (EMP) for constructing dominating set in mobile ad-hoc networks with unidirectional links by Waheed, Bassam M. S., Mohd Ali, Borhanuddin, Khatun, Sabira, Mohd Sidek, Roslina

    Published 2014
    “…Our enhanced algorithm features a good locality properties since it need only 2-hop neighborhood information within each node. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli by Dzulkifli, Muhammad Zulhilmie

    Published 2021
    “…The manual method often has a lack of knowledge that the menu that shows the customer does not provide any information that customers need, such as an image of the food or ingredients used in the menu. …”
    Get full text
    Get full text
    Thesis