Search Results - (( development priority detection algorithm ) OR ( java data visualization algorithm ))

  • Showing 1 - 18 results of 18
Refine Results
  1. 1

    Enhanced bibliographic data retrieval and visualization using query optimization and spectral centrality measure by Ramasamy, Chitra, Zolkepli, Maslina

    Published 2019
    “…This study proposing an enhance bibliographic data retrieval and visualization using hybrid clustering method consists of K-harmonic mean (KHM) and Spectral Algorithm and eigenvector centrality measure. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin by Nasaruddin, Amir Hambaly

    Published 2019
    “…The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Dynamic force-directed graph with weighted nodes for scholar network visualization by Mohd. Aris, Khalid Al-Walid, Ramasamy, Chitra, Mohd Aris, Teh Noranis, Zolkepli, Maslina

    Published 2022
    “…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Design Of Robot Motion Planning Algorithm For Wall Following Robot by Ali Hassan, Muhamad Khairul

    Published 2006
    “…Computer A will be sent the data to computer B through the internet/LAN using JAVA program. …”
    Get full text
    Get full text
    Monograph
  6. 6

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Simulation and Design of an Intelligent Mobile Robot for Fire Fighting by Chor, Keong Seng

    Published 2003
    “…More comprehensive study in behaviour coordination will be the major focus to ensure smoother robot navigation and more effective fire detection capability. Keywords: (Fuzzy logic control, mobile robot, part recognition algorithms)…”
    Get full text
    Get full text
    Thesis
  8. 8

    Development Of Machine Learning User Interface For Pump Diagnostics by Lee, Zhao Yang

    Published 2022
    “…Build up a user interface by using Visual Studio Code (VSC) to run the coding of Cascading Style Sheet (CSS), Hyper Text Markup Language (HTML) and JavaScript (JS) as a webpage and connect to Azure Machine Learning Model and this will allow the user from using the model from a webpage when they have active internet with any devices.…”
    Get full text
    Get full text
    Monograph
  9. 9

    An Improved Network Intrusion Detection Method Based On CNN-LSTM-SA by Hui, Bian, Chiew, Kang Leng

    Published 2025
    “…Network intrusion detection is an essential component of contemporary cybersecurity strategies, and the development of efficient techniques to accurately identify malicious activities has become a priority. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    An enhancement of multi-factor weighted approach technique in prioritizing test cases by comparing similarity distance by Al-Shaibani, Alaa Alrhman Mohammed Raweh, Ahmad, Johanna, Hassan, Rohayanti, Baharom, Salmi, Antari, Dwinta Suci

    Published 2025
    “…The higher the dissimilarity value, the higher the probability of detecting new faults. Previous research has used Jaccard Distance to measure the distance to prioritize test cases with the same priority value. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Tacit knowledge for business intelligence framework using cognitive-based approach by Surbakti, Herison

    Published 2022
    “…The framework was tested on 23 librarians from several university libraries in West Java and Yogyakarta, Indonesia. The algorithm starts with a content targeted interview to identify the list of problems faced by librarians. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Depth frame loss concealment for wireless transmission utilising motion detection information by Ranjbari, Mohamadreza

    Published 2014
    “…The proposed method is able to improve the quality of video in comparison with frame copy algorithm. The feasibility and performance of the proposed method based on motion detection error concealment is evaluated analytically by considering different packet and frame loss rates. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Student resource exchange: a web-based system for sharing educational resources among students by Saw, Hui Loo

    Published 2025
    “…In addition, the platform introduces AI-powered study tools, including automated question generation and flashcards, as well as a built-in smart calendar planner that applies conflict detection and priority-based scheduling algorithms to help students manage study sessions and deadlines effectively. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Improved rate of faults detection can give developers chance to debug the faulty software earlier. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…Prototypes, simulations, observations and interviews were used as the data gathering methods. An offline FOA Java simulation was carried out to evaluate the capability of the MRA method in preventing FOA attack. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Design and Modelling of an Energy Aware Dynamic Management for Wireless Sensor Node with Dual Harvesters by Abdal-Kadhim., Ali Mohammed

    Published 2020
    “…To reduce the power consumption while not compromising the integrity of the signal transmission, the sensor node is improved with a novel energy-aware Event-Priority-Driven Dissemination (EPDD) algorithm. It is developed to make the sink station able to detect a missing node within the network. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Evaluation approach for efficient countermeasure techniques against denial-of-service attack on MPSoC-based IoT using multi-criteria decision-making by Al-Hchaimi, Ahmed Abbas Jasim, Sulaiman, Nasri, Mustafa, Mohd Amrallah, Mohtar, Mohd Nazim, Mohd Hassan, Siti Lailatul, Muhsen, Yousif Raad

    Published 2022
    “…Results: (1) CRITIC weighting shows that MPSoC NoC Routing Algorithm (XY and YX) is the highest weight criterion, whereas latency (clock/cycle) is the less weight criterion. (2) The Fermatean-FDOSM-based group ranking shows that the Collision Point Router Detection (CPRD) countermeasure technique is the first-ranked alternative compared to the Secure Model Checkers (SMCs) approach. (3) The DoS A-CTs priority ranks were subjected to a systematic ranking that was confirmed by solid correlation results throughout thirteen criterion weight values. …”
    Get full text
    Get full text
    Article
  18. 18

    Crash Recovery Support For Variable Strength T-Way Test Generation Strategy by Abdullah, Syahrul Afzal Che

    Published 2016
    “…Empirical evidence in the literature indicated that t-way test generation strategy has managed to minimize the test cases significantly whilst maintaining the fault detection capability of the testing process. Much useful progress has been achieved as far as the development of t-way test generation strategy is concerned. …”
    Get full text
    Get full text
    Thesis