Search Results - (( developing a intervention algorithm ) OR ( java data visualization algorithm ))
Search alternatives:
- intervention algorithm »
- data visualization »
- a intervention »
- java »
-
1
Enhanced bibliographic data retrieval and visualization using query optimization and spectral centrality measure
Published 2019“…This study proposing an enhance bibliographic data retrieval and visualization using hybrid clustering method consists of K-harmonic mean (KHM) and Spectral Algorithm and eigenvector centrality measure. …”
Get full text
Get full text
Get full text
Article -
2
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
Get full text
Get full text
Thesis -
3
Dynamic force-directed graph with weighted nodes for scholar network visualization
Published 2022“…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
Get full text
Get full text
Article -
4
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006“…Computer A will be sent the data to computer B through the internet/LAN using JAVA program. …”
Get full text
Get full text
Monograph -
5
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…Build up a user interface by using Visual Studio Code (VSC) to run the coding of Cascading Style Sheet (CSS), Hyper Text Markup Language (HTML) and JavaScript (JS) as a webpage and connect to Azure Machine Learning Model and this will allow the user from using the model from a webpage when they have active internet with any devices.…”
Get full text
Get full text
Monograph -
7
VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS.
Published 2012“…It is noted that active user intervention increases the acceleration of Genetic Algorithm towards an optimal solution. …”
Get full text
Get full text
Thesis -
8
Tacit knowledge for business intelligence framework using cognitive-based approach
Published 2022“…The framework was tested on 23 librarians from several university libraries in West Java and Yogyakarta, Indonesia. The algorithm starts with a content targeted interview to identify the list of problems faced by librarians. …”
Get full text
Get full text
Thesis -
9
-
10
i-Saturate: The New Discovery of Stopping Criterion in Genetic Algorithm
Published 2020“…A stopping criterion for evolutionary algorithms like Genetic Algorithm (GA) is crucial in determining the optimum solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Determining malaria risk factors in Abuja, Nigeria using various statistical approaches
Published 2018“…A Wilcoxon signed rank test showed a significant change in incidence scores of households in the district considered for pre- and post-test interventions. …”
Get full text
Get full text
Thesis -
12
-
13
-
14
Wireless water quality cloud monitoring system with self-healing algorithm
Published 2017“…The new platform to date for the Internet of Things (IoT) and cloud database is Favoriot. Favoriot is a platform for IoT and machine-to-machine (M2M) development. …”
Get full text
Get full text
Conference or Workshop Item -
15
Clock Distribution Network Building Algorithm For Multiple Ips In System On A Chip
Published 2017“…The algorithm is done when a final checking on the clock skew is done. …”
Get full text
Get full text
Thesis -
16
Prediction of UiTM student academic performance using Naive Bayes algorithm / Muhammad Irfan Zahin Jailani
Published 2024“…With the help of customized interventions and early identification of at-risk pupils, the proposed approach seeks to increase graduation rates and overall achievement.The main objectives of this study include studying the Naive Bayes algorithm in student academic performance prediction, designing and developing a student academic performance prediction model utilizing Naive Bayes, and evaluating the accuracy of the prediction prototype using the developed model. …”
Get full text
Get full text
Thesis -
17
Predictive Modelling of Stroke Occurrence among Patients using Machine Learning
Published 2023“…Advanced machine learning algorithms, including logistic regression, decision trees, random forests, and support vector machines, were utilized to analyses the dataset and develop a predictive model. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Development of a wearable human fall detection system
Published 2022“…In this study, an accelerometer and gyroscope sensors were installed in a wearable fall detector. A fall detection algorithm was developed using MATLAB. …”
Get full text
Get full text
Article -
19
Reliability fuzzy clustering algorithm for wellness of elderly people
Published 2019“…Therefore, the implementation of z-numbers is taken into consideration, where it has more authority to describe the knowledge of human being and extensively used in uncertain information development. Thus, the objective of this paper is to propose a reliable fuzzy clustering algorithm using z-numbers. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Intelligent DNA signature detection for internet worms
Published 2011“…Active worms spread in an automated fashion flooding the Internet in a very short time.Slammer worm infected more than 90% of vulnerable machines within 10 minutes on January 25th, 2003.Hence it is necessary to monitor and detect the worms as soon as they are introduced to minimize the damage caused by them.This project concentrates on developing an anti-scanning worm detection system that can automatically detect and control the spread of internet scanning worms without any manual intervention.The Intelligent Failure Connection Algorithm (IFCA) developed in this project can detect both stealth and normal worms within a short time.Experiments conducted as part of the evaluation shows that IFCA detects a worm within two scanning cycles of the worm.This is faster than any of the currently available algorithms or mechanisms reported in the literature.The IFCA uses Artificial Immune System (AIS) for the purpose of monitoring and detecting the worms.The Traffic Signature Algorithm (TSA) developed in the project captures the traffic signature of the worm from the infector when it sends the traffic to the victim.The Intelligent DNA Signature Detection Algorithm (IDNASDA) algorithm works by breaking an infection session into different infection phases, each phase containing a number of different traffic such as Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), or User Datagram Protocol (UDP).Finally it converts the traffic signature to DNA signature.The tests carried out show that the IDNASD could detect DNA signature for MSBlaster worm.…”
Get full text
Get full text
Get full text
Get full text
Monograph
