Search Results - (( developing block tree algorithm ) OR ( java visualization based algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1

    A novel steganography algorithm using edge detection and MPC algorithm by Aref Rezaei, Leili Farzinvash, Ali Farzamnia

    Published 2019
    “…To diminish the imposed distortion by data embedding in edge blocks, we employ LSB and MPC algorithms. In the proposed scheme, the blocks are split into some groups firstly. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    A performance analysis of association rule mining algorithms by Fageeri, S.O., Ahmad, R., Alhussian, H.

    Published 2016
    “…The results of the CPU profiler of Java VisualVM showed that Binary-Based algorithm performs better than Eclat algorithm in-terms of both execution times and memory usage. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Online Clothing Shopbots via Web Content Extraction / Nurul Syazwani Ramzi by Ramzi, Nurul Syazwani

    Published 2017
    “…These block tree is constructed by using DOM (document object model) tree. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin by Nasaruddin, Amir Hambaly

    Published 2019
    “…D3.js is used as a technology to visualize the result in interactive form or dynamic visualization which is a JavaScript library and Python is a language to program the system. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Decision tree and rule-based classification for predicting online purchase behavior in Malaysia / Maslina Abdul Aziz, Nurul Ain Mustakim and Shuzlina Abdul Rahman by Abdul Aziz, Maslina, Mustakim, Nurul Ain, Abdul Rahman, Shuzlina

    Published 2024
    “…The result indicated that the highest accuracy of 89.34% was achieved by the Random Tree algorithm, while the rule-based algorithm PART reached an accuracy of 87.56%. …”
    Get full text
    Get full text
    Article
  7. 7

    Enhanced bibliographic data retrieval and visualization using query optimization and spectral centrality measure by Ramasamy, Chitra, Zolkepli, Maslina

    Published 2019
    “…This web based approach will be using Java programming language and Mongo DB (NoSQL database) to improve the retrieval performance by 80%, precision of the search result of the bibliographic data by omitting non-significance papers and visualizing a clearer network diagram using centrality measure for better decision making. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Design Of Robot Motion Planning Algorithm For Wall Following Robot by Ali Hassan, Muhamad Khairul

    Published 2006
    “…Navigation algorithms are tested in a variety of differently shaped environments to encourage the development of robust solutions, and reduce the possibility of solutions based on memorization of a fixed set of movements. …”
    Get full text
    Get full text
    Monograph
  9. 9

    Dynamic force-directed graph with weighted nodes for scholar network visualization by Mohd. Aris, Khalid Al-Walid, Ramasamy, Chitra, Mohd Aris, Teh Noranis, Zolkepli, Maslina

    Published 2022
    “…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
    Get full text
    Get full text
    Article
  10. 10

    Advanced Processing of UPM-APSB’s AISA Airborne Hyperspectral Images for Individual Timber Species Identification and Mapping by Jusoff, Kamaruzaman

    Published 2007
    “…Kelat constituted the highest count of species (1,402) mapped followed by Kedondong (1,185 trees), Medang (1,116 trees) and others out of the total 13,861 trees. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Enhanced android malware detection framework using API application framework layer by Abdul Ghani, Saidah Mastura

    Published 2023
    “…Besides, Application Framework layer consists of manager blocks which can be used to access data in Android device, making the most vulnerable layer in which the malware developers like to exploit. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Graphical user interface for bounded-addition fuzzy splicing systems and their variants / Mathuri Selvarajoo ... [et al.] by Selvarajoo, Mathuri, Santono, Mohd Pawiro, Fong, Wan Heng, Sarmin, Nor Haniza

    Published 2023
    “…In this research, a graphical user interface is developed to generate all the splicing languages generated by bounded-addition fuzzy splicing systems and their variants. An algorithm is developed using JAVA and Visual Studio Code software in order to replace the time-consuming manual computation of the languages generated by bounded-addition fuzzy DNA splicing systems and their variants.…”
    Get full text
    Get full text
    Article
  13. 13

    Design and performance analysis of a fast 4-way set associative cache controller using Tree Pseudo Least Recently Used algorithm by Hazlan, Mohamed Alfian Al-Zikry, Gunawan, Teddy Surya, Yaacob, Mashkuri, Kartiwi, Mira, Arifin, Fatchul

    Published 2023
    “…A key feature of this design is the incorporation of the Tree Pseudo Least Recently Used (PLRU) algorithm for cache replacement, a strategic choice aimed at optimizing cache performance. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Enhancement of medical image compression algorithm in noisy WLANS transmission by Algaet, Mustafa Almahdi

    Published 2018
    “…For image reconstruction,decoding steps based the developed quantization architecture are examined.The EICA is particularly useful where the size of the transmitted data needs to be reduced to minimize the image transmission time.For data compression with suitable and effective performance,enhanced independent components analysis (EICA) is proposed as an algorithm for compression and decompression of medical data.A comparative analysis is performed based on existing data compression techniques:discrete cosine transform (DCT), set partitioning in hierarchical trees (SPIHT),and Joint Photographic Experts Group (JPEG 2000).Three main modules,namely,compression segment (CS),transceiver segment (TRS),and outcome segment (OTS) modules,are developed to realize a fully computerized simulation tool for medical data compression with suitable and effective performance.To compress medical data using algorithms,CS module involves four different approaches which are DCT, SPIHT,JPEG 2000 and EICA.TRS module is processed by low-cost WLANs with low-bandwidth transmission.Finally,OTS is used for data decompression and visualization result.In terms of compression module,results show the benefits of applying EICA in medical data compression and transmission.While for system design,the developed system displays favorable outcomes in compressing and transmitting medical data.In conclusion,all three modules (CS,TRS,and OTS) are integrated to yield a computerized prototype named as Medical Data Simulation System(Medata-SIM) computerized system that includes medical data compression and transceiver for visualization to aid medical practitioners in carrying out rapid diagnoses.…”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Splicing system and their variants with fuzzy algebraic sum / Mohd Pawiro Santono Othman by Othman, Mohd Pawiro Santono

    Published 2023
    “…Moreover, the languages generated by algebraic sum fuzzy splicing systems and their variants are developed by considering the threshold and the languages generated are categorized according to the Chomsky hierarchy. An algorithm is then developed in JAVA using visual code studio software to replace the time-consuming manual computation of the languages generated by algebraic sum fuzzy splicing systems and their variants. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Tacit knowledge for business intelligence framework using cognitive-based approach by Surbakti, Herison

    Published 2022
    “…The framework was tested on 23 librarians from several university libraries in West Java and Yogyakarta, Indonesia. The algorithm starts with a content targeted interview to identify the list of problems faced by librarians. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…Over the years, various picture-based password systems were proposed to exploit the utility of pictures for user authentication. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Mobile application for real time baby sign language recognition using YOLOv8 / Siti Aishah Idris and Ahmad Firdaus Ahmad Fadzil by Idris, Siti Aishah, Ahmad Fadzil, Ahmad Firdaus

    Published 2024
    “…This model can recognize and interpret baby signs based on visual input from the mobile phone’s camera in real time, and also includes a dictionary feature that can be a learning tool for parents and caregivers. …”
    Get full text
    Get full text
    Get full text
    Article