Search Results - (( same location based algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  3. 3

    Harmony search algorithm for curriculum-based course timetabling problem by Wahid, Juliana, Mohd Hussin, Naimah

    Published 2013
    “…With proper modification in terms of the approach in this algorithm would make the algorithm perform better on curriculum-based course timetabling.…”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Harmony search algorithm for curriculum-based course timetabling problem by Wahid, Juliana, Mohd Hussin, Naimah

    Published 2013
    “…However, the algorithm produced results that were not comparatively better than those previously known as best solution.With proper modification in terms of the approach in this algorithm would make the algorithm perform better on curriculum-based course timetabling.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    Optimization of image mapping & camera coverage efficiency for continuous location and tracking by Avinash A.R., Chandan K.C.

    Published 2023
    “…The Vision Based location and tracking is a vastly escalating technology mainly used to monitor various environments. …”
    Conference paper
  7. 7
  8. 8

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  9. 9

    Design of wavelet neural networks based on symmetry fuzzy C-means for function approximation by Zainuddin, Zarita, Pauline, Ong

    Published 2013
    “…In this paper, an enhanced fuzzy C-means algorithm, specifically the modified point symmetry–based fuzzy C-means algorithm (MPSDFCM), was proposed, in order to determine the optimal initial locations for the translation vectors. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Wifi fingerprinting indoor positioning with multiple access points in a single base station using probabilistic method by Mazlan, M.A.A.A., Khir, M.H.M., Saad, N.M., Dass, S.C.

    Published 2017
    “…Based on experimental results, the proposed multiple APs in a single base station was found to reduce the number of base stations required to achieve the same or better accuracy as existing approach using the same number of APs. …”
    Get full text
    Get full text
    Article
  11. 11

    Experimental studies on impact damage location in composite aerospace structures using genetic algorithms and neural networks by Mahzan, Shahruddin, J. Staszewski, Wieslaw, Worden, Keith

    Published 2010
    “…This paper compares two advanced signal processing methods for impact location in composite aircraft structures. The first method is based on a modified triangulation procedure and Genetic Algorithms whereas the second technique applies Artificial Neural Networks. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15

    Balancing exploration and exploitation in ACS algorithms for data clustering by Jabbar, Ayad Mohammed, Sagban, Rafid, Ku-Mahamud, Ku Ruhana

    Published 2019
    “…The ACOC performs clustering based on random initial centroids, which are generated iteratively during the algorithm run. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Privacy-aware personal navigation services / Melissa Shahrom by Shahrom, Melissa

    Published 2013
    “…Therefore, protecting the confidentiality of location privacy is extremely vital. This innovation produces an algorithm that is able to protect location privacy and at the same time generate robust navigation instructions without depending on precise location information. …”
    Get full text
    Get full text
    Book Section
  17. 17

    WIFI FINGERPRINTING INDOOR POSITIONING WITH MULTIPLE ACCESS-POINTS IN A SINGLE BASE STATION USING PROBABILISTIC METHOD by BIN MAZLAN, MUHAMMAD AL AMIN AMALI

    Published 2017
    “…Based on experimental results, the proposed multiple APs in a single base station was found to reduce the number of base stations required to achieve the same or better accuracy as existing approach using the same number of APs. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
    Get full text
    Get full text
    Student Project
  19. 19
  20. 20