Search Results - (( developing moderating detection algorithm ) OR ( java visualization based algorithm ))
Search alternatives:
- developing moderating »
- visualization based »
- java visualization »
-
1
A performance analysis of association rule mining algorithms
Published 2016“…The results of the CPU profiler of Java VisualVM showed that Binary-Based algorithm performs better than Eclat algorithm in-terms of both execution times and memory usage. …”
Get full text
Get full text
Conference or Workshop Item -
2
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…D3.js is used as a technology to visualize the result in interactive form or dynamic visualization which is a JavaScript library and Python is a language to program the system. …”
Get full text
Get full text
Thesis -
3
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Enhanced bibliographic data retrieval and visualization using query optimization and spectral centrality measure
Published 2019“…This web based approach will be using Java programming language and Mongo DB (NoSQL database) to improve the retrieval performance by 80%, precision of the search result of the bibliographic data by omitting non-significance papers and visualizing a clearer network diagram using centrality measure for better decision making. …”
Get full text
Get full text
Get full text
Article -
5
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006“…Navigation algorithms are tested in a variety of differently shaped environments to encourage the development of robust solutions, and reduce the possibility of solutions based on memorization of a fixed set of movements. …”
Get full text
Get full text
Monograph -
6
Dynamic force-directed graph with weighted nodes for scholar network visualization
Published 2022“…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
Get full text
Get full text
Article -
7
Graphical user interface for bounded-addition fuzzy splicing systems and their variants / Mathuri Selvarajoo ... [et al.]
Published 2023“…In this research, a graphical user interface is developed to generate all the splicing languages generated by bounded-addition fuzzy splicing systems and their variants. An algorithm is developed using JAVA and Visual Studio Code software in order to replace the time-consuming manual computation of the languages generated by bounded-addition fuzzy DNA splicing systems and their variants.…”
Get full text
Get full text
Article -
8
Unveiling sarcastic intent: web-based detection of sarcasm in news / Mohd Nazzim Lahaji, Tajul Rosli Razak and Mohammad Hafiz Ismail
Published 2023“…The results demonstrate the superiority of the developed model in sarcasm detection for news headlines. …”
Get full text
Get full text
Get full text
Article -
9
-
10
Splicing system and their variants with fuzzy algebraic sum / Mohd Pawiro Santono Othman
Published 2023“…Moreover, the languages generated by algebraic sum fuzzy splicing systems and their variants are developed by considering the threshold and the languages generated are categorized according to the Chomsky hierarchy. An algorithm is then developed in JAVA using visual code studio software to replace the time-consuming manual computation of the languages generated by algebraic sum fuzzy splicing systems and their variants. …”
Get full text
Get full text
Thesis -
11
Tacit knowledge for business intelligence framework using cognitive-based approach
Published 2022“…The framework was tested on 23 librarians from several university libraries in West Java and Yogyakarta, Indonesia. The algorithm starts with a content targeted interview to identify the list of problems faced by librarians. …”
Get full text
Get full text
Thesis -
12
-
13
Mid-infrared spectroscopy for early detection of basal stem rot disease in oil palm
Published 2014“…This verifies the potential of mid-infrared spectroscopy for Ganoderma detection in early symptomless stages of infection in oil palm.…”
Get full text
Get full text
Article -
14
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…This thesis proposed the use of both prevention and detection mechanisms to solve the security and privacy issues. …”
Get full text
Get full text
Thesis -
15
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
16
UAV-based RGB/NIR aerial imaging for the detection of Ganoderma disease in oil palm plantation / Ezzati Bahrom
Published 2018“…Advances in remote sensed imagery and image processing using unmanned aerial vehicle (UAV) for Ganoderma disease detection could be developed to reduce operating cost and time as well as cover wider oil palm areas. …”
Get full text
Get full text
Thesis -
17
Depth frame loss concealment for wireless transmission utilising motion detection information
Published 2014“…The proposed method is able to improve the quality of video in comparison with frame copy algorithm. The feasibility and performance of the proposed method based on motion detection error concealment is evaluated analytically by considering different packet and frame loss rates. …”
Get full text
Get full text
Thesis -
18
-
19
Computer aided diagnoses for detecting the severity of Keratoconus
Published 2024“…Aim: The aim of this study is to use thresholding-based segmentation and morphological techniques to calculate the pathological ratio of the keratoconic cornea through cone base area extraction for the detection of KC severity and tracking of disease development. …”
Get full text
Get full text
Get full text
Article -
20
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Over the years, various picture-based password systems were proposed to exploit the utility of pictures for user authentication. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis
