Search Results - (( user evaluation method algorithm ) OR ( based location based algorithm ))
Search alternatives:
- method algorithm »
- user evaluation »
- based location »
-
1
An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias
Published 2017“…This algorithm developed to allow user to receive push notification effectively based on the location of user’s smartphone that can be detected by Bluetooth Smart Ready Technology (BLE). …”
Get full text
Get full text
Thesis -
2
Agent-based extraction algorithm for computational problem solving
Published 2015“…Four agents have been proposed as an agent based model for CPS, which are User_Agent, PAC_Agent, IPO_Agent and Algorithm_Agent. …”
Get full text
Get full text
Thesis -
3
Performance evaluation of Location-Sensitive Handoff using positioning method / Azuwa Ali and Saiful Fadzli Salian
Published 2009“…This project investigate the performance of handoff process with the help of location information which is called Location-Sensitive Handoff (L-SH) using the location positioning method. …”
Get full text
Get full text
Research Reports -
4
Space allocation for examination scheduling using Genetic Algorithm / Alya Kauthar Azman
Published 2025“…This study applies Genetic Algorithms (GA) to optimize space distribution for test scheduling, addressing the challenge of managing multiple test sessions across distinct locations. …”
Get full text
Get full text
Thesis -
5
Auto-formation group chat for fitness application with rule-based / Amar Aslam Ramli
Published 2018“…Moreover, the algorithm used for rule-based expert system is forward chaining method. …”
Get full text
Get full text
Student Project -
6
An improved marine predators algorithm tuned data-driven multiple-node hormone regulation neuroendocrine-PID controller for multi-input–multi-output gantry crane system
Published 2023“…Comparative findings alongside other existing metaheuristic-based algorithms confirmed excellence of the proposed method through its superior performance against the conventional MPA, particle swarm optimization (PSO), grey wolf optimizer (GWO), moth-flame optimization (MFO), multi-verse optimizer (MVO), sine-cosine algorithm (SCA), salp-swarm algorithm (SSA), slime mould algorithm (SMA), flow direction algorithm (FDA), and the formally published adaptive safe experimentation dynamics (ASED)-based methods.…”
Get full text
Get full text
Get full text
Article -
7
Recommendation System Model For Decision Making in the E-Commerce Application
Published 2024thesis::doctoral thesis -
8
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
Get full text
Get full text
Get full text
Academic Exercise -
9
-
10
Improvement of land cover mapping using Sentinel 2 and Landsat 8 imageries via non-parametric classification
Published 2020“…The results indicated that good classification performance depends on these factors. All algorithms showed more stability and accuracy when training size applied is more than 6% by the Equal Sample Rate (ESR) method with six variables. …”
Get full text
Get full text
Thesis -
11
Improved criteria determination of an automated negative lightning return strokes characterisation using Brute-Force search algorithm
Published 2021“…A total of 206 negative lightning return strokes waveforms were analysed and automatically characterised using the proposed algorithm. Comparisons of different data, including the manual data (i.e. obtained through the conventional method), data (automated) from a previous study, and the automated data (i.e. obtained using the proposed algorithm), were also carried out by evaluating the percentage difference, arithmetic mean, and standard deviation. …”
Get full text
Get full text
Thesis -
12
GSM-WCDMA hybrid localization techniques in multilayer heterogeneous network / Muhammad Naqiuddin Hassan
Published 2013“…The objectives are to increase the accuracy and precision on mobile location. To implement LDT, two types of methods are used. …”
Get full text
Get full text
Thesis -
13
Liver segmentation on CT images using random walkers and fuzzy c-means for treatment planning and monitoring of tumors in liver cancer patients
Published 2017“…The proposed method is based on a hybrid method integrating random walkers algorithm with integrated priors and particle swarm optimized spatial fuzzy c-means (FCM) algorithm with level set method and AdaBoost classifier. …”
Get full text
Get full text
Get full text
Thesis -
14
An efficient trust-based decision-making approach for WSNs: Machine learning oriented approach
Published 2023“…Machine Learning (ML) has been shown to be an effective tool for trust evaluation in WSNs, offering several benefits over existing schemes such as greater adaptability, scalability, and accuracy since ML algorithms can analyze and learn from the data collected in real-time from multiple sources (sensor readings, network traffic, and user behavior) enabling them to dynamically adjust their decision-making criteria based on the current network conditions. …”
Get full text
Get full text
Article -
15
Optimal planning of photovoltaic distributed generation considering uncertainties using monte carlo pdf embedded MVMO-SH
Published 2021“…A hybrid population – based stochastic optimization method named MVMO-SH algorithm is proposed to optimize PVDG locations and sizes in the grid system network. …”
Get full text
Get full text
Thesis -
16
Augmented reality navigation using android
Published 2024“…The development process involves designing user-friendly interfaces, integrating location services, implementing real-time object recognition algorithms, and utilizing Android's built-in mapping and navigation functionalities. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Intelligent deep machine learning cyber phishing URL detection based on BERT features extraction
Published 2022“…In this paper, a novel URL phishing detection technique based on BERT feature extraction and a deep learning method is introduced. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Building extraction for 3D city modelling using infused airborne LiDAR and high-resolution aerial photograph
Published 2021“…In contrast, we had 97%, 93%, and 91% for the pixel-based evaluation values, respectively, for the deep learning method. …”
Get full text
Get full text
Thesis -
19
Location based services of nearest petrol station using asymmetric key algorithm / Muhammad Awwab Mohd Amdan
Published 2014Subjects: Get full text
Get full text
Thesis -
20
Enhanced location and positioning in wimax networks with virtual mimo base station
Published 2015“…Furthermore, a new hybrid algorithm enhancement of mobile station (MS) location estimation by using a single MIMO base station (SMBS) with the virtual base station has been introduced. …”
Get full text
Get full text
Get full text
Get full text
Thesis
