Search Results - (( developing formative within algorithm ) OR ( java visualization system algorithm ))

Refine Results
  1. 1

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…This report details the development of an autonomous guide robot system for visually impaired individuals using the ROS 2 framework and the Wheeltec R550 Robot platform. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2

    Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin by Nasaruddin, Amir Hambaly

    Published 2019
    “…D3.js is used as a technology to visualize the result in interactive form or dynamic visualization which is a JavaScript library and Python is a language to program the system. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Graphical user interface for bounded-addition fuzzy splicing systems and their variants / Mathuri Selvarajoo ... [et al.] by Selvarajoo, Mathuri, Santono, Mohd Pawiro, Fong, Wan Heng, Sarmin, Nor Haniza

    Published 2023
    “…In this research, a graphical user interface is developed to generate all the splicing languages generated by bounded-addition fuzzy splicing systems and their variants. An algorithm is developed using JAVA and Visual Studio Code software in order to replace the time-consuming manual computation of the languages generated by bounded-addition fuzzy DNA splicing systems and their variants.…”
    Get full text
    Get full text
    Article
  5. 5

    Splicing system and their variants with fuzzy algebraic sum / Mohd Pawiro Santono Othman by Othman, Mohd Pawiro Santono

    Published 2023
    “…An algorithm is then developed in JAVA using visual code studio software to replace the time-consuming manual computation of the languages generated by algebraic sum fuzzy splicing systems and their variants. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    A new routing mechanism for energy-efficient in bluetooth mesh-low power nodes based on wireless sensor network by Almuslehi, Hussein Saad Mohammed

    Published 2023
    “…This research assesses the efficacy of routing algorithms within the Bluetooth M-LPNWSN architecture. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Development Of Machine Learning User Interface For Pump Diagnostics by Lee, Zhao Yang

    Published 2022
    “…Build up a user interface by using Visual Studio Code (VSC) to run the coding of Cascading Style Sheet (CSS), Hyper Text Markup Language (HTML) and JavaScript (JS) as a webpage and connect to Azure Machine Learning Model and this will allow the user from using the model from a webpage when they have active internet with any devices.…”
    Get full text
    Get full text
    Monograph
  9. 9

    Enhanced weight-based clustering algorithm to provide reliable delivery for VANET safety applications by Bello Tambawal, Abubakar, Noor, Rafidah Md, Salleh, Rosli, Chembe, Christopher, Oche, Michael

    Published 2019
    “…In this study, enhanced weight-based clustering algorithm (EWCA) was developed to address these challenges. …”
    Get full text
    Get full text
    Article
  10. 10

    The evaluation of content-oriented XML document retrieval: a case study of FTMSK official letter / Hayati Abdul Rahman by Abdul Rahman, Hayati

    Published 2006
    “…The inverted file method has been used for the indexing techniques to develop the indexing algorithm of the FTMSK official letter. …”
    Get full text
    Get full text
    Research Reports
  11. 11

    The evaluation of contentoriented XML document retrieval: a case study of official letter / Hayati Abd Rahman by Abd Rahman, Hayati

    Published 2006
    “…The inverted file method has been used for the indexing techniques to develop the indexing algorithm of the FTMSK official letter. …”
    Get full text
    Get full text
    Research Reports
  12. 12

    Tacit knowledge for business intelligence framework using cognitive-based approach by Surbakti, Herison

    Published 2022
    “…The framework was tested on 23 librarians from several university libraries in West Java and Yogyakarta, Indonesia. The algorithm starts with a content targeted interview to identify the list of problems faced by librarians. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A new image scrambling technique using block rotation algorithm based on Rubik’s cube by Abugharsa, Ahmed Bashir, Hasan Basari, Abd Samad, Almangush, Hamida

    Published 2013
    “…Thus, to develop an efficient scheme to generate non fixed iteration in the image scrambling algorithm in order to eliminate the problem of visual leakage. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Analysis of daytime and nighttime ground level ozone concentrations using boosted regression tree technique by Yahaya, Noor Zaitun, Ghazali, Nurul Adyani, Ahmad, Sabri, Mohammad Asri, Mohammad Akmal, Ibrahim, Zul Fahdli, Ramli, Nor Azman

    Published 2017
    “…Results showed that the model developed was within the acceptable range and could be used to understand ozone formation and identify potential sources of ozone for estimating O3 concentrations during daytime and nighttime Results indicated that the wind speed, wind direction, relative humidity, and temperature were the most dominant variables in terms of influencing ozone formation. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    SNR Based DSDV Routing Protocol for MANET by Mohd Fairuz, Muhamad Fadzil

    Published 2012
    “…In this project the Signal-to-Noise (SNR) based routing protocol has been adapted into the standard Destination Sequenced Distance Vector (DSDV) routing algorithm by developing an algorithm to calculate the cumulative average SNR from source to destination and apply the algorithm in the DSDV routing protocol. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. The first and second proposed methods were incorporated into the proposed Background Pass-Go (BPG) system and Visual Identification Protocol Professional (VIP Pro) system respectively. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat by Sakamat, Norzehan

    Published 2021
    “…Size was extracted using Extreme Point Detection algorithm and Hit or Miss Transformation method was used to extract the stroke formation pattern. …”
    Get full text
    Get full text
    Thesis
  18. 18

    General Algorithm of n-Multiple Coil Shape for Variable Links Hyper-Redundant Robotic Manipulator by Jamali, Annisa, Khan, Md. Raisuddin, Rahman , Md Mozasser

    Published 2011
    “…The ‗S‘ shape formation, termed as multiple coil shape in hyper-redundant manipulator is essential for negotiating cluttered environment that exists inside the human body, engine compartment or within a collapsed building. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    A decomposed streamflow non-gradientbased artificial intelligence forecasting algorithm with factoring in aleatoric and epistemic variables / Wei Yaxing by Wei , Yaxing

    Published 2024
    “…To summarise, metaheuristic algorithms can give a superior optimization approach than the traditional artificial neural network method, providing the computing time is within an acceptable range. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Smart citation manager by Teh, Zhi Yun

    Published 2019
    “…(ii) PDF viewer to render PDF document within the system environment. (iii) Mind mapping technique allow the mapping of ideas, its source and related reference item within single interface. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis