Search Results - (( development fund based algorithm ) OR ( java data visualization algorithm ))
Search alternatives:
- data visualization »
- development fund »
- fund based »
- java »
-
1
Enhanced bibliographic data retrieval and visualization using query optimization and spectral centrality measure
Published 2019“…This study proposing an enhance bibliographic data retrieval and visualization using hybrid clustering method consists of K-harmonic mean (KHM) and Spectral Algorithm and eigenvector centrality measure. …”
Get full text
Get full text
Get full text
Article -
2
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
Get full text
Get full text
Thesis -
3
Dynamic force-directed graph with weighted nodes for scholar network visualization
Published 2022“…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
Get full text
Get full text
Article -
4
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006“…Computer A will be sent the data to computer B through the internet/LAN using JAVA program. …”
Get full text
Get full text
Monograph -
5
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Unique class encryption (UCE) substitution boxes (S-Boxes) using mysterious Quranic for block ciphers in ICT security
Published 2010“…A search for a new paradigm against the unforeseen and paranormal attacks lead to an invention called Unique Class Encryption (UCE) that is based on the non-parametric and mysterious verses of the Al-Quran.Earlier, the Al-Muqatta’at based UCE was developed and tested in a Red-Hat cluster funded under IRPA and completed in 2006. …”
Get full text
Get full text
Proceeding Paper -
7
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…Build up a user interface by using Visual Studio Code (VSC) to run the coding of Cascading Style Sheet (CSS), Hyper Text Markup Language (HTML) and JavaScript (JS) as a webpage and connect to Azure Machine Learning Model and this will allow the user from using the model from a webpage when they have active internet with any devices.…”
Get full text
Get full text
Monograph -
8
Tacit knowledge for business intelligence framework using cognitive-based approach
Published 2022“…The framework was tested on 23 librarians from several university libraries in West Java and Yogyakarta, Indonesia. The algorithm starts with a content targeted interview to identify the list of problems faced by librarians. …”
Get full text
Get full text
Thesis -
9
Development of improved metaheuristic algorithms for modelling and control of a flexible manipulator system
Published 2019“…The developed algorithms are formulated based on a spiral model approach and a sine model approach. …”
Get full text
Get full text
Research Report -
10
-
11
-
12
Classification models for higher learning scholarship award decisions
Published 2018“…A dataset of successful and unsuccessful applicants was taken and processed as training data and testing data used in the modelling process. Five algorithms were employed to develop a classification model in determining the award of the scholarship, namely J48, SVM, NB, ANN and RT algorithms. …”
Get full text
Get full text
Get full text
Article -
13
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Prototypes, simulations, observations and interviews were used as the data gathering methods. An offline FOA Java simulation was carried out to evaluate the capability of the MRA method in preventing FOA attack. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Determinants factors of biotechnology commercialization in Malaysia: resource-based view perspective / Nur Hidayat Nordin
Published 2023“…A structure path modeling has been designed based on these constructs by relating it to commercialization success using the PLS algorithm and bootstrapping method. …”
Get full text
Get full text
Thesis -
15
ATM crime detection using image processing integrated video surveillance : a systematic review
Published 2019“…The findings of this review may help the future researchers to develop dynamic and multipurpose algorithms for surveillance system that can detect and prevent ATM crime.…”
Get full text
Get full text
Get full text
Article -
16
Optimum calculation of tilt angles and components of standalone photovoltaic system to harvest solar energy
Published 2018“…Then, the optimum design is proposed based on the lowest levelized cost of energy (LCE) and net present value (NPV ). …”
Get full text
Get full text
Get full text
Thesis -
17
Modified dynamic programming model with limited order picking capacity / Noraimi Azlin Mohd Nordin
Published 2021“…Throughout the study, the system in the end is hoped to develop a proper procedures in order picking routine. …”
Get full text
Get full text
Get full text
Thesis
