Search Results - (( construct visualization technique algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    Budget visualizer using circle packing technique / Nursyahira Zulkeply by Zulkeply, Nursyahira

    Published 2019
    “…In order to construct this data visualization, the circle packing algorithm is used to visualize these budgets. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4

    Hybrid genetic algorithm for uncapacitated university examination timetabling problem by Ishak, Suhada

    Published 2015
    “…All proposed algorithms are coded in C using Microsoft Visual C++ 6.0 as the compiler. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A Multidimensional Search Space Using Interactive Genetic Algorithm by Farooq, H., Zakaria, M.N., Hassan, M.F., Sulaiman, Suziah

    Published 2010
    “…This paper applied an Interactive Genetic Algorithm (IGA) technique to design an visualization environment for search space. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Brain Topographic Mapping of Emotions using Computational Cerebellum by Yaacob, Hamwira Sakti, Kamaruddin, Norhaslinda, Abdul Rahman, Abdul Wahab

    Published 2013
    “…Several neuroimaging techniques including Electroencephalography (EEG) have been employed to capture and visualize the underlying dynamics of emotional neurophysiology. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  7. 7

    Visual-based semantic simultaneous localization and mapping for Robotic applications: a review by Atoui, Oussama, Husni, Husniza, Che Mat, Ruzinoor

    Published 2019
    “…One of most important techniques that plays a key role in elevating a mobile robot’s independence is its ability to construct a map from an unknown surrounding in an unknown initial position, and with the use of onboard sensors, localize itself in this map. …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9
  10. 10

    Real-time shadow casting using fake soft shadow volume with stencil buffer by Lee, Kong Weng

    Published 2006
    “…Comparison using proposed algorithm with an established algorithm revealed that the proposed algorithm is two to five times faster. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14
  15. 15

    Image based autonomous indoor parallel parking assist on omni-directional vehicle (ODV) by Edwind, Liaw Yee Kang

    Published 2016
    “…The image processing algorithm is first developed using Visual Studio C++ and OpenCV. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  16. 16
  17. 17

    Smart biosecurity door locking system / Nur Nadia Syahirah ‘Asri by ‘Asri, Nur Nadia Syahirah

    Published 2017
    “…Furthermore, the system was developed using Fingerprint Matching Algorithm (FMA), Image Processing technique and embedded programming technique. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A Stepper Motor Design Optimization Using by Wong, Chin Wei

    Published 2005
    “…In order to achieve the optimum design, Genetic Algorithms (GAs) approach has been applied. GAs approach is selected because it is a powerful and broadly applicable stochastic search and optimization techniques that works for many problems that are very difficult to solve by conventional methods. …”
    Get full text
    Get full text
    Monograph
  19. 19

    Near infrared palm image acquisition and two-finger valley point-based image extraction for palm vascular pattern detection by Mohd Noh, Zarina

    Published 2019
    “…A vascular image enhancement processing comprises of several enhancement techniques were recommended based on their ability in enhancing palm vascular pattern visually. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Hazard identification on fractionation column using rule based expert system by Mohd Yunus, Mohd Yusri, Ali, Mohamad Wijayanuddin

    Published 2001
    “…The study has contributed to an improvement of hazard identification technique and proposed an algorithm by considering the whole consequences of process deviation in each stream. …”
    Get full text
    Get full text
    Article