Search Results - (( phone location based algorithm ) OR ( web application ((bees algorithm) OR (bat algorithm)) ))
Search alternatives:
- web application »
- phone location »
- bat algorithm »
-
1
Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm
Published 2022“…This research will conduct comparison of hybrid Genetic Algorithm and Bat Algorithm (GA-BA) with Genetic Algorithm (GA) and Bat Algorithm (BA). …”
Get full text
Get full text
Get full text
Academic Exercise -
2
Objects tracking from natural features in mobile augmented reality
Published 2013“…The pose matrix from extracted features was calculated by Homography. The adapted algorithm was tested in a mobile AR-prototype application using iPhone. …”
Get full text
Get full text
Get full text
Article -
3
The child tracker using location awareness / Muhammad Idham Amdan
Published 2017“…One the significance feature of this project is to track the position of device precisely. The location retrieve from client or the tracked device will be computed and filtered based on the algorithm to generate addresses from latitude and longitude, the coordinate of mobile phone. …”
Get full text
Get full text
Thesis -
4
Task scheduling in cloud computing environment using hybrid genetic algorithm and artificial bee colony
Published 2022Get full text
Get full text
Get full text
Academic Exercise -
5
Outdoor marker-less tracking and pose calculating system for mobile augmented reality
Published 2014“…Implementation of marker-based Augmented Reality systems on mobile phones is mostly a solved problem. …”
Get full text
Get full text
Thesis -
6
Developing Bus Tracking System that predicts the arrival times of public buses at Universiti Teknologi PETRONAS (UTP) bus stops.
Published 2004“…In this project, an algorithm will be developed to predict the amount of time needed for the incoming public bus to arrive, based on the current location of the bus and the current time. …”
Get full text
Get full text
Final Year Project -
7
Performance evaluation of corner effect in UMTS / Nurzaliza Ghazali
Published 2009Get full text
Get full text
Thesis -
8
Fuzzy logic-based arrival time estimation for indoor navigation using augmented reality
Published 2025“…This study proposes a mobile AR application for indoor navigation that uses an intelligent signage algorithm based on fuzzy logic to estimate arrival time. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
The banjir rescue: an IoT-based flood evacuation center system / Nur Aliah Syamsurial
Published 2020“…Finally, the selection is made where the algorithm will choose the nearest evacuation center to the victims. …”
Get full text
Get full text
Thesis -
10
Development of eCall for Malaysia's automotive industries
Published 2019“…The location of incident has been identified using GSM cell phone and GPS location capability. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
Qiblah direction: An android application
Published 2023“…The calculation of the Qiblah direction is based on Spherical Trigonometry and the True North sensor in the smart phone will be manipulated. …”
Article -
12
Banjir rescue: IOT-based flood evacuation center / Nor Azimah Khalid ... [et al.]
Published 2025“…Finally, the selection is made where the algorithm will choose the nearest evacuation center to the victims. …”
Get full text
Get full text
Article -
13
P2P-Based Image Recognition for Component Tracking in a Large Engineering Domain
Published 2011“…For example an engineer can photograph a component and search to locate the part or obtain related information from using simple devices such as a mobile phone. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…In Chapter 2, we propose a new algorithm based on incremental Radial Basis Function Network (RBFN) to accelerate the learning in stream data. …”
Get full text
Get full text
Thesis -
15
Lightweight ECC Based Multifactor Authentication Protocol (LEMAP) for Device to Device Cellular Network
Published 2022“…The results show that LEMAP is 6%-28% percent stronger than the selected benchmark algorithms such as 2PAKEP, Chaotic based authentication and TwoFactor authentication protocol. …”
Get full text
Get full text
Thesis -
16
A study on ambulance response time in Kuala Lumpur, Malaysia
Published 2008“…The use of either hospital based or NGO based emergency services did not affect the ambulance response time significantly.…”
Get full text
Get full text
Thesis
