Search Results - (( data replication testing algorithm ) OR ( java data visualization algorithm ))
Search alternatives:
- replication testing »
- data visualization »
- testing algorithm »
- java »
-
1
A novel deadlock detection algorithm for neighbour replication on grid environment
Published 2012“…The aim of this research is to handle the deadlock problem in NRG to preserve the consistency of data and increase the throughput. The NRGDD simulation model has been developed to test the algorithm on NRG. …”
Get full text
Get full text
Thesis -
2
Enhanced bibliographic data retrieval and visualization using query optimization and spectral centrality measure
Published 2019“…This study proposing an enhance bibliographic data retrieval and visualization using hybrid clustering method consists of K-harmonic mean (KHM) and Spectral Algorithm and eigenvector centrality measure. …”
Get full text
Get full text
Get full text
Article -
3
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
Get full text
Get full text
Thesis -
4
Dynamic force-directed graph with weighted nodes for scholar network visualization
Published 2022“…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
Get full text
Get full text
Article -
5
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006“…Computer A will be sent the data to computer B through the internet/LAN using JAVA program. …”
Get full text
Get full text
Monograph -
6
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Exploration of machine learning forecasting methods in M4 competition / Muhammad Halim Hamdan and Shuzlina Abdul-Rahman
Published 2021“…Each technique was replicated, trained and tested accordingly. M4 competition dataset was used in this research, with 100,000 time series data and multiple data frequency, which is enough to replicate the real-world situation. …”
Get full text
Get full text
Get full text
Article -
8
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…Build up a user interface by using Visual Studio Code (VSC) to run the coding of Cascading Style Sheet (CSS), Hyper Text Markup Language (HTML) and JavaScript (JS) as a webpage and connect to Azure Machine Learning Model and this will allow the user from using the model from a webpage when they have active internet with any devices.…”
Get full text
Get full text
Monograph -
9
Finite element modeling and updating for dynamic study of exhaust structure
Published 2020“…Hence, this paper is carried out to reduce the discrepancies between numerical prediction results with measured test data on FE model of exhaust structure by implementing FE model updating using SOL200 algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Tacit knowledge for business intelligence framework using cognitive-based approach
Published 2022“…The framework was tested on 23 librarians from several university libraries in West Java and Yogyakarta, Indonesia. The algorithm starts with a content targeted interview to identify the list of problems faced by librarians. …”
Get full text
Get full text
Thesis -
11
Rockfall source identification using a hybrid Gaussian mixture-ensemble machine learning model and LiDAR data
Published 2019“…Moreover, the proposed model has achieved the optimal prediction accuracies (92%) on the basis of testing data, thereby indicating that the model can be generalised and replicated in different regions, and the proposed method can be applied to various landslide studies.…”
Get full text
Get full text
Get full text
Article -
12
A Novel Wrapper-Based Optimization Algorithm for the Feature Selection and Classification
Published 2023“…Additionally, the Wilcoxon rank test was used to perform the significance analysis between the proposed SCSOKNN method and six other algorithms for a p-value less than 5.00E-02. …”
Get full text
Get full text
Article -
13
Enhancing clustering algorithm with initial centroids in tool wear region recognition
Published 2020“…K-means clustering has become the most applied algorithm in discovering classes in an unsupervised scenario. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Securing IoT networks using machine learning-resistant physical unclonable functions (PUFs) on edge devices
Published 2026“…The NIST statistical test suite was applied to the CRP data of the RO PUF to evaluate its randomness quality. …”
Get full text
Get full text
Get full text
Article -
15
A self-adaptive agent-based simulation modelling framework for dynamic processes
Published 2023“…Case studies for simulating dynamic processes of new student registration (administrative domain), transport request (transportation domain) and crime investigation (security domain) with real data collected through interview and document reviews to test the proposed idea. …”
text::Thesis -
16
Finger-Vein Biometric Identification Using Convolutional Neural Network
Published 2016“…An identification rate of 100.00% is achieved, with an 80/20 percent ratio for separation of training and test samples, respectively. An additional number of subjects have also been tested, in which for 81 subjects an accuracy of 99.38% is achieved.…”
Get full text
Get full text
Get full text
Article -
17
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Prototypes, simulations, observations and interviews were used as the data gathering methods. An offline FOA Java simulation was carried out to evaluate the capability of the MRA method in preventing FOA attack. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Access control model based on trust, purpose, and role in materialized view for privacy protection
Published 2019“…This study focuses on data privacy protection in materialized view. Materialized view is a replica of a table which is created in a very large system where data are replicated from the master tables. …”
Get full text
Get full text
Thesis -
19
Performance Prediction of Compulsory Subjects and Recommendation of Subject Options for China’s New College Entrance Examination
Published 2026“…The dataset was split 80/20 for training and testing. Four machine learning algorithms: Naïve Bayes (NB), Decision Tree (DT), Artificial Neural Networks (ANNs), and Support Vector Machines (SVMs) were evaluated using accuracy, precision, recall, F1 score, and Matthews Correlation Coefficient (MCC). …”
Get full text
Get full text
Get full text
Thesis -
20
Mobile Crowd Steering Evacuation Model via Agent Based Simulation by Applying the Social Force Model
Published 2025“…In addition, simulated data can overcome the lack of genuine datasets for specific crowd situations. …”
Get full text
Get full text
Get full text
Get full text
Thesis
