Search Results - (( developing implementation perspective algorithm ) OR ( java visualization system algorithm ))
Search alternatives:
- developing implementation »
- visualization system »
- java visualization »
- system algorithm »
-
1
Visdom: Smart guide robot for visually impaired people
Published 2025“…This report details the development of an autonomous guide robot system for visually impaired individuals using the ROS 2 framework and the Wheeltec R550 Robot platform. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…D3.js is used as a technology to visualize the result in interactive form or dynamic visualization which is a JavaScript library and Python is a language to program the system. …”
Get full text
Get full text
Thesis -
3
-
4
Graphical user interface for bounded-addition fuzzy splicing systems and their variants / Mathuri Selvarajoo ... [et al.]
Published 2023“…In this research, a graphical user interface is developed to generate all the splicing languages generated by bounded-addition fuzzy splicing systems and their variants. An algorithm is developed using JAVA and Visual Studio Code software in order to replace the time-consuming manual computation of the languages generated by bounded-addition fuzzy DNA splicing systems and their variants.…”
Get full text
Get full text
Article -
5
Splicing system and their variants with fuzzy algebraic sum / Mohd Pawiro Santono Othman
Published 2023“…An algorithm is then developed in JAVA using visual code studio software to replace the time-consuming manual computation of the languages generated by algebraic sum fuzzy splicing systems and their variants. …”
Get full text
Get full text
Thesis -
6
Process Planning Optimization In Reconfigurable Manufacturing Systems
Published 2008“…On the other hand, the superior performance of the genetic algorithm that implements an extended diversity control mechanism demonstrates that more competent genetic algorithms can be designed through customized operators. …”
Get full text
Get full text
Thesis -
7
Traffic management algorithms for LEO satellite networks
Published 2016“…Overall, from all the three experiments that have been conducted, the proposed routing algorithms which have been developed to manage the network traffic have proved better than the previously developed algorithms in several perspectives especially for the implementation of real-time applications in LEO satellite networks.…”
Get full text
Get full text
Get full text
Thesis -
8
-
9
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…Build up a user interface by using Visual Studio Code (VSC) to run the coding of Cascading Style Sheet (CSS), Hyper Text Markup Language (HTML) and JavaScript (JS) as a webpage and connect to Azure Machine Learning Model and this will allow the user from using the model from a webpage when they have active internet with any devices.…”
Get full text
Get full text
Monograph -
10
Tacit knowledge for business intelligence framework using cognitive-based approach
Published 2022“…The framework was tested on 23 librarians from several university libraries in West Java and Yogyakarta, Indonesia. The algorithm starts with a content targeted interview to identify the list of problems faced by librarians. …”
Get full text
Get full text
Thesis -
11
Agents for Fuzzy Indices of Reliability Power System with Uncertainty Using Monte Carlo Algorithm
Published 2014“…The standard deviation of load level uncertainty in power system reliability assessment has a different value for each load level leading to complexity iterations required in the convergence of Monte Carlo algorithm. In this present work, the fuzzy system agent perspective would be used to control such convergence. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. The first and second proposed methods were incorporated into the proposed Background Pass-Go (BPG) system and Visual Identification Protocol Professional (VIP Pro) system respectively. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Extreme air pollutant data analysis using classical and Bayesian approaches
Published 2015“…MTM algorithm is an extension of MH algorithm, designed to improve the convergence of MH algorithm by performing parallel computation. …”
Get full text
Get full text
Thesis -
14
An interactive C++ programming courseware (SIFOO) / Mazliana Hasnan … [et al.]
Published 2012Get full text
Get full text
Book Section -
15
Strategies for effective value management practice in construction industry
Published 2017“…The objectives were to develop a new optimisation algorithm and apply the results to control construction project costs. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Stereo Vision Tracking System
Published 2009“…In this work, an initial development study and implementation of stereo vision tracking system was done. …”
Get full text
Get full text
Conference or Workshop Item -
17
-
18
Bahasa Melayu Stemmer / Subbu Valliappan
Published 2004“…Each of the chapter presents an explanation of the system in a different perspective as to enhance one's understanding of this stemmer.The main idea of this project is to build stemmer that can stem any given words, and to develop a standard stemming algorithm in Malay Language. …”
Get full text
Get full text
Thesis -
19
Sub-route reversal repair mechanism and differential evolution for urban transit network design problem
Published 2017“…All proposed algorithms are executed using Python programming language, and the computational results show that the proposed algorithms improve the best-so-far results from the literature in most cases.…”
Get full text
Get full text
Thesis -
20
Machine learning in predicting anti-money laundering compliance with protection motivation theory among professional accountants
Published 2023“…The research elaborates on the design and implementation of machine learning models based on three algorithms: Decision Tree, Gradient Boosted Tree, and Support Vector Machine. …”
Get full text
Get full text
Article
