Search Results - (( construct evaluation based algorithm ) OR ( java _ visualization algorithm ))

Refine Results
  1. 1

    A performance analysis of association rule mining algorithms by Fageeri, S.O., Ahmad, R., Alhussian, H.

    Published 2016
    “…The results of the CPU profiler of Java VisualVM showed that Binary-Based algorithm performs better than Eclat algorithm in-terms of both execution times and memory usage. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4
  5. 5

    Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin by Nasaruddin, Amir Hambaly

    Published 2019
    “…D3.js is used as a technology to visualize the result in interactive form or dynamic visualization which is a JavaScript library and Python is a language to program the system. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Risk assessment for safety and health algorithm for building construction in Oman by Al-Anbari, Saud Said

    Published 2015
    “…The general objective of this study is to carry out a Risk Assessment for Safety and Health (RASH) algorithm for building construction in Oman and to develop a calculation methodology to evaluate safety and health. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Multi-base number representation in application to scalar multiplication and pairing computation by Mohammed Ismail, Abdelwahed

    Published 2011
    “…Multi-bases number representation is used to construct new versions of Miller’s algorithm. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Enhanced bibliographic data retrieval and visualization using query optimization and spectral centrality measure by Ramasamy, Chitra, Zolkepli, Maslina

    Published 2019
    “…This study proposing an enhance bibliographic data retrieval and visualization using hybrid clustering method consists of K-harmonic mean (KHM) and Spectral Algorithm and eigenvector centrality measure. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11

    Design Of Robot Motion Planning Algorithm For Wall Following Robot by Ali Hassan, Muhamad Khairul

    Published 2006
    “…Algorithms are developed for a simulated mobile robot that uses an array of range finders for navigation. …”
    Get full text
    Get full text
    Monograph
  12. 12

    A coalition model for efficient indexing in wireless sensor network with random mobility / Hazem Jihad Ali Badarneh by Hazem Jihad , Ali Badarneh

    Published 2021
    “…The second evaluation divides into three scenarios. The first one evaluates Coalition-Based Index-Tree framework independently, without any effect from Dynamic-Coalition framework and Static-Coalition algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Dynamic force-directed graph with weighted nodes for scholar network visualization by Mohd. Aris, Khalid Al-Walid, Ramasamy, Chitra, Mohd Aris, Teh Noranis, Zolkepli, Maslina

    Published 2022
    “…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
    Get full text
    Get full text
    Article
  14. 14

    An evolutionary based features construction methods for data summarization approach by Rayner Alfred, Suraya Alias, Chin, Kim On

    Published 2015
    “…In the process of summarizing relational data, a genetic algorithm is also applied and several feature scoring measures are evaluated in order to find the best set of relevant constructed features. …”
    Get full text
    Get full text
    Research Report
  15. 15
  16. 16
  17. 17

    A Pairwise Test Suite Generator based on Melody Search Algorithm by Toh, S. Yuen, Al-Omoush, Ala’a A., Foo, W. Wen, Goh, G. Hau, Alsewari, Abdulrahman A.

    Published 2016
    “…This paper aims to introduce MS as a pairwise testing strategy called a Pairwise Test suite generator based Melody Search Algorithm (PTMS). A pairwise testing is an operative approach in the combinatorial test suite construction. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    A hybrid sampling-based path planning algorithm for mobile robot navigation in unknown environments by Khaksar, Weria

    Published 2013
    “…The motion planning problem poses the question of how a robot can move from an initial to a final position. Sampling-based motion planning is a class of randomized path planning algorithms with proven completeness. …”
    Get full text
    Get full text
    Thesis
  19. 19

    The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment by Hasnira, Md. Lazim

    Published 2004
    “…The methodology and testing procedure which are used during this evaluation is based on a simulation model. Result from the evaluation set constructed is found able to show the performance of the cryptography system. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Using algorithmic taxonomy to evaluate lecturer workload by Hashim, Ruhil Hayati, Abdul Hamid, Jamaliah, Selamat, Mohd Hasan, Ibrahim, Hamidah, Abdullah, Rusli, Mohayidin, Mohd Ghazali

    Published 2006
    “…The Lecturer profile contains information of lecturer teaching load, research, publication and many more. We constructed an algorithmic taxonomy based on the lecturer profile data to measure lecturer teaching workload. …”
    Get full text
    Get full text
    Get full text
    Article