Search Results - (( based visualisation based algorithm ) OR ( java implementation some algorithm ))
Search alternatives:
- based visualisation »
- visualisation based »
- java implementation »
- implementation some »
- some algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
Multi-dimensional Data Visualisation using Mobile Augmented Reality
Published 2020“…This algorithm is mobile based. Therefore, this system can provide rapid and easily accessible information to policy and decision makers.…”
Get full text
Get full text
Get full text
Article -
4
-
5
A COMPARISON STUDY OF DATA CLUSTERING AND VISUALISATION TECHNIQUES WITH VARIOUS DATA TYPES
Published 2020“…The results for the experiment on visualisation of clustering methods, it showed that various clustering techniques have their visualisation for cluster analysis. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
6
-
7
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
8
3D terrain visualisation for GIS: A comparison of different techniques
Published 2011“…The comparison is based on the quality of terrain visualisation, representation of object on terrain, representation of slope, and error in terrain. …”
Get full text
Get full text
Book Section -
9
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
10
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
11
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
12
Dynamic modeling by usage data for personalization systems
Published 2009Get full text
Get full text
Conference or Workshop Item -
13
-
14
ENGINEERING DESIGN WITH PSO ALGORITHM
Published 2019“…Creating a PSO algorithm-based infrastructure integrating with the recommendation system will further enhance solution to the design problem. …”
Get full text
Get full text
Final Year Project -
15
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
16
-
17
Secured agriculture sensor data based on end-to-end encryption using raspberry pi
Published 2025“…The system integrates multiple robust encryption algorithms—AES-128, AES-256, ChaCha20, and Twofish—for end-to-end data protection. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
PREDICTION OF HFMD DISEASE OUTBREAK FROM TWITTER
Published 2019“…Based on the Map visualisation, Malaysia is predicted to face HFMD outbreak in the period between January until March for the coming years. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
19
Correlation analysis and predictive performance based on KNN and decision tree with augmented reality for nuclear primary cooling process / Ahmad Azhari Mohamad Nor
Published 2024“…Subsequently, predictive models employing k-nearest neighbour and decision tree algorithms are constructed and evaluated based on accuracy, precision, and recall metrics. …”
Get full text
Get full text
Thesis -
20
Implementation of RIO in UMJaNetSim / Chan Chin We
Published 2004“…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
Get full text
Get full text
Thesis
