Search Results - (( data visualisation a algorithm ) OR ( java application model algorithm ))
Search alternatives:
- data visualisation »
- application model »
- java application »
- visualisation a »
- model algorithm »
- a algorithm »
-
1
Multi-dimensional Data Visualisation using Mobile Augmented Reality
Published 2020“…Therefore, this algorithm uses AR to provide a multi-display solution for improved data visualisation after processing, summarising and classifying data. …”
Get full text
Get full text
Get full text
Article -
2
Effectiveness of silhouette rendering algorithms in terrain visualisation
Published 2002“…This approach has been implemented in a 3D modelling system to create a new method of displaying and viewing terrain data in an artistic style. …”
Get full text
Get full text
Conference or Workshop Item -
3
-
4
Visualisation System of COVID-19 Data in Malaysia
Published 2021“…This study aims to provide a system, using COVID-19 data as a sample to visualise and analyse cases, deaths, discharged ICU cases updates in Malaysia as a whole state wise of COVID-19 daily statistics. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
6
3D terrain visualisation for GIS: A comparison of different techniques
Published 2011“…The results of this paper will be of help to the users in identifying the best technique of terrain visualisation suitable for GIS data.…”
Get full text
Get full text
Book Section -
7
Visualisation System of COVID-19 Data in Malaysia
Published 2021“…This study aims to provide a system, using COVID-19 data as a sample to visualise and analyse cases, deaths, discharged ICU cases updates in Malaysia as a whole state wise of COVID-19 daily statistics. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
A COMPARISON STUDY OF DATA CLUSTERING AND VISUALISATION TECHNIQUES WITH VARIOUS DATA TYPES
Published 2020“…Clustering is used to identify the intrinsic grouping of a set of unlabelled data. It can be applied in data mining exploration and statistical data analysis. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
9
-
10
-
11
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
12
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
-
14
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
15
-
16
-
17
Dynamic modeling by usage data for personalization systems
Published 2009Get full text
Get full text
Conference or Workshop Item -
18
PREDICTION OF HFMD DISEASE OUTBREAK FROM TWITTER
Published 2019“…This is because both Naive Bayes and SVM are baseline algorithm used in text classification. In the end, a visualisation of HFMD Disease Map is presented to visualize the city that suffer HFMD outbreak using geo-located tweet that related with HFMD. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
19
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…In this type of environment it is nearly impossible to prove the effectiveness of a scheduling algorithm. Hence the main objective of this study is to develop a desktop grid simulator toolkit for measuring and modeling scheduler algorithm performance. …”
Get full text
Get full text
Final Year Project -
20
Secure Image Steganography Using Encryption Algorithm
Published 2016“…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
Get full text
Get full text
Conference or Workshop Item
