Search Results - (( developing filing _ algorithm ) OR ( java visualization using algorithm ))

Refine Results
  1. 1
  2. 2

    A performance analysis of association rule mining algorithms by Fageeri, S.O., Ahmad, R., Alhussian, H.

    Published 2016
    “…In this paper, we evaluate the performance of association rule mining algorithms in-terms of execution times and memory usage using the CPU profiler of Java VisualVM. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin by Nasaruddin, Amir Hambaly

    Published 2019
    “…D3.js is used as a technology to visualize the result in interactive form or dynamic visualization which is a JavaScript library and Python is a language to program the system. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Enhanced bibliographic data retrieval and visualization using query optimization and spectral centrality measure by Ramasamy, Chitra, Zolkepli, Maslina

    Published 2019
    “…This study proposing an enhance bibliographic data retrieval and visualization using hybrid clustering method consists of K-harmonic mean (KHM) and Spectral Algorithm and eigenvector centrality measure. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Design Of Robot Motion Planning Algorithm For Wall Following Robot by Ali Hassan, Muhamad Khairul

    Published 2006
    “…Algorithms are developed for a simulated mobile robot that uses an array of range finders for navigation. …”
    Get full text
    Get full text
    Monograph
  8. 8

    Keyword indexing for text documents using signature files / Abdul Hakim A. Gafa by A. Gafa, Abdul Hakim

    Published 2008
    “…The main of this project is to compare the effectiveness of searching Text documents between using Signature files algorithm and Inverted files algorithm. In order to achieve the main objective, the Signature Files algorithm for indexing methods needs to be understood and implemented. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    A Comparative Study on Compression of Different Image File Formats by Ooi, Poh San

    Published 1999
    “…One system was developed for users to convert the image file format to enable them to view the size of each image and to display image. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The obtained results show the developed prototype was able to encrypt and decrypt the file correctly without making any errors. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  12. 12

    E-Raser: file shredder application with content replacement by using random words function by Mohd Nahar, Nur Farah Aqilah, Ab Rahman, Nurul Hidayah, Mohammad, Kamarudin Malik

    Published 2018
    “…Thus, this study proposed a file shredding application named E-Raser which replacing the content of the file using random words function algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Dynamic force-directed graph with weighted nodes for scholar network visualization by Mohd. Aris, Khalid Al-Walid, Ramasamy, Chitra, Mohd Aris, Teh Noranis, Zolkepli, Maslina

    Published 2022
    “…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
    Get full text
    Get full text
    Article
  14. 14

    Development of the Multipurpose Integrated Multimedia Presentation System Based on the CCM Algorithm by Asnawi, Rustam, Wan Ahmad, Wan Fatimah, A. Rambli, Dayang R.

    Published 2010
    “…By developing and applying the CCM algorithm into the existing multimedia player (as a result of our previous research), it can be improved and become an integrated multimedia presentation system. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Automatic generation of user-defined test algorithm description file for memory BIST implementation by Hussin, Razaidi, Jidin, Aiman Zakwan, Loh, Wan Ying, Mispan, Mohd Syafiq, Lee, Weng Fook

    Published 2022
    “…This paper presents the development of software that automatically generates a description file of a UDA to be deployed for memory BIST circuit implementation using Tessent memory BIST software. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Audio steganography using least significant bit and AES cryptographic algorithm / Nurul Hidayah Ahmad Zukri ... [et al.] by Ahmad Zukri, Nurul Hidayah, Kamarudin, Nur Khairani, Izraf Ishak, Mohd Enif, Md Rashid, Nor Aimuni

    Published 2018
    “…In this paper, Least Significant Bit (LSB) algorithm has been proposed. This algorithm can help users to protect their confidential information during transmission by embedding the data inside the audio .wav file. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    The development of semantic meta-database: an ontology based semantic integration of biological databases by Samsudin, Ruhaidah, Deris, Safaai, Othman, Muhammad Razib, Md. Illias, Rosli

    Published 2007
    “…The tool comprises two intelligent algorithms. The first algorithm combines parallel genetic algorithm with the split-and-merge algorithm. …”
    Get full text
    Get full text
    Monograph
  19. 19

    Secure mobile AES encryptor (SMAE) by Satia, Anbalagan

    Published 2016
    “…The purpose of this project is to identify a way to develop a mobile web application for the encryption and decryption of files using the 256 –bit Advanced Encryption Standard (AES) encryption algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  20. 20

    Statistical fixed range multiple selection algorithm for peer-to-peer system by Kweh, Yeah Lun, Othman, Mohamed, Ahmad, Fatimah, Ibrahim, Hamidah

    Published 2010
    “…This algorithm is developed based on the statistical knowledge about the uniform distribution nature of the data which has been arranged in ascending order in the local file. …”
    Get full text
    Get full text
    Conference or Workshop Item