Search Results - (( developing world connection algorithm ) OR ( java data visualization algorithm ))
Search alternatives:
- connection algorithm »
- data visualization »
- developing world »
- java »
-
1
Enhanced bibliographic data retrieval and visualization using query optimization and spectral centrality measure
Published 2019“…This study proposing an enhance bibliographic data retrieval and visualization using hybrid clustering method consists of K-harmonic mean (KHM) and Spectral Algorithm and eigenvector centrality measure. …”
Get full text
Get full text
Get full text
Article -
2
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
Get full text
Get full text
Thesis -
3
Dynamic force-directed graph with weighted nodes for scholar network visualization
Published 2022“…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
Get full text
Get full text
Article -
4
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006“…Computer A will be sent the data to computer B through the internet/LAN using JAVA program. …”
Get full text
Get full text
Monograph -
5
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…The purpose of this thesis is to introduce and demonstrate a new algorithm for Internet and e-mail security. The proposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
Get full text
Get full text
Thesis -
7
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…Build up a user interface by using Visual Studio Code (VSC) to run the coding of Cascading Style Sheet (CSS), Hyper Text Markup Language (HTML) and JavaScript (JS) as a webpage and connect to Azure Machine Learning Model and this will allow the user from using the model from a webpage when they have active internet with any devices.…”
Get full text
Get full text
Monograph -
8
New approach of cryptography algorithm for e- mail applications
Published 2005“…The purpose of this paper is to introduce and demonstrate a new algorithm for Internet and e-mail security. The purposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
Get full text
Get full text
Conference or Workshop Item -
9
Tacit knowledge for business intelligence framework using cognitive-based approach
Published 2022“…The framework was tested on 23 librarians from several university libraries in West Java and Yogyakarta, Indonesia. The algorithm starts with a content targeted interview to identify the list of problems faced by librarians. …”
Get full text
Get full text
Thesis -
10
Elastic-TCP: flexible congestion control algorithm to adapt for high-BDP networks
Published 2019“…In the last decade, the demand for Internet applications has been increased, which increases the number of data centers across the world. These data centers are usually connected to each other using long-distance and high-speed networks. …”
Get full text
Get full text
Get full text
Article -
11
-
12
Forecasting of photovoltaic output using hybrid particle swarm optimization-artificial neural network model / Muhamad Faizol Adli Abdullah
Published 2010“…Backpropagation (BP) algorithm is widely used to solve many real world problems by using the concept of Multilayer Perception (MLP). …”
Get full text
Get full text
Thesis -
13
Functional Connectivity Assessment on Aging Brain using Functional Near Infrared Spectroscopy (fNIRS)
Published 2017“…They performed three categories of semantic verbal fluency test while neuronal activity in prefrontal cortex (PFC) measured using fNIRS. A new software algorithm has been developed to derive functional connectivity parameters. …”
Get full text
Get full text
Final Year Project -
14
Heart-design nexus: the emotion algorithm
Published 2025“…How might these approaches help create a world that is not just functionally efficient but emotionally enriching? …”
Get full text
Get full text
Book -
15
Automating commercial video game development using computational intelligence
Published 2011“…Pac-man. The resulting algorithm is referred to as an Evolution Strategies Neural Network or ESNet. …”
Get full text
Get full text
Get full text
Article -
16
Impact of multiplay transmission in mobile WIMAX using overlay scanning: article / Akmarya Syukhairilnisah Mohd Akhir
Published 2014“…In hard handover has a short time break known as handover interruption decrease the QoS due to connection between MS and serving BS closed and ranging hand initiation to establish new connection. …”
Get full text
Get full text
Article -
17
Incorporating stemming algorithm in the Malay information retrieval that employs Thesaurus aproach / Mohd Rosmadi Mokhtar
Published 2001“…A wide range of text-based information therefore can be searched and retrieved from online connection anywhere in the world. This type of popularity is due to advancement in technology that is rapidly growing from day to day. …”
Get full text
Get full text
Thesis -
18
Automatic Mind Maps Generation for The Holy Quran
Published 2022“…The majority of the Holy Quran learners suffer from lack of quality in memorization understanding and connecting its topics. Therefore, the aim of this paper is to develop an algorithm that automatically generate the topics based on the mind map of a set of verses in the Holy Quran. …”
Get full text
Get full text
Article -
19
Conclusion
Published 2019“…The book contains theoretical and practical knowledge of state-of-the-art authentication technologies and their applications in big data, IoT, and cloud computing with this technologically connected world. The first six chapters of the book provide the fundamental details of the authentication technologies.The objective of Chapters 7 to 11 is to develop fast and secure algorithms for resource-constrained IoT and cloud computing, while the aim of Chapter 12 is to protect the data by laws and policies. …”
Get full text
Get full text
Get full text
Book Chapter -
20
Impact of multiplay transmission in mobile WIMAX using overlay scanning / Akmarya Syukhairilnisah Mohd Akhir
Published 2014“…All simulations are run using MATLAB software to develop a new Overlay Scanning Mechanism(OSMA) algorithm. …”
Get full text
Get full text
Thesis
