Search Results - (( java application customization algorithm ) OR ( construct visualization technique algorithm ))
Search alternatives:
- customization algorithm »
- construct visualization »
- java application »
-
1
Budget visualizer using circle packing technique / Nursyahira Zulkeply
Published 2019“…In order to construct this data visualization, the circle packing algorithm is used to visualize these budgets. …”
Get full text
Get full text
Thesis -
2
-
3
Parallel visualization approach of a 3D heart model
Published 2008Get full text
Get full text
Conference or Workshop Item -
4
Hybrid genetic algorithm for uncapacitated university examination timetabling problem
Published 2015“…All proposed algorithms are coded in C using Microsoft Visual C++ 6.0 as the compiler. …”
Get full text
Get full text
Thesis -
5
A Multidimensional Search Space Using Interactive Genetic Algorithm
Published 2010“…This paper applied an Interactive Genetic Algorithm (IGA) technique to design an visualization environment for search space. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Brain Topographic Mapping of Emotions using Computational Cerebellum
Published 2013“…Several neuroimaging techniques including Electroencephalography (EEG) have been employed to capture and visualize the underlying dynamics of emotional neurophysiology. …”
Get full text
Get full text
Get full text
Proceeding Paper -
7
Visual-based semantic simultaneous localization and mapping for Robotic applications: a review
Published 2019“…One of most important techniques that plays a key role in elevating a mobile robot’s independence is its ability to construct a map from an unknown surrounding in an unknown initial position, and with the use of onboard sensors, localize itself in this map. …”
Get full text
Get full text
Article -
8
-
9
-
10
Real-time shadow casting using fake soft shadow volume with stencil buffer
Published 2006“…Comparison using proposed algorithm with an established algorithm revealed that the proposed algorithm is two to five times faster. …”
Get full text
Get full text
Thesis -
11
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
12
Virtual GIS walkthrough Innovation Center / Mohd Sufean Abu Samah
Published 1999Get full text
Get full text
Thesis -
13
Unapparent information revelation for counterterrorism: Visualizing associations using a hybrid graph-based approach
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
14
-
15
Image based autonomous indoor parallel parking assist on omni-directional vehicle (ODV)
Published 2016“…The image processing algorithm is first developed using Visual Studio C++ and OpenCV. …”
Get full text
Get full text
Undergraduates Project Papers -
16
-
17
Smart biosecurity door locking system / Nur Nadia Syahirah ‘Asri
Published 2017“…Furthermore, the system was developed using Fingerprint Matching Algorithm (FMA), Image Processing technique and embedded programming technique. …”
Get full text
Get full text
Thesis -
18
A Stepper Motor Design Optimization Using
Published 2005“…In order to achieve the optimum design, Genetic Algorithms (GAs) approach has been applied. GAs approach is selected because it is a powerful and broadly applicable stochastic search and optimization techniques that works for many problems that are very difficult to solve by conventional methods. …”
Get full text
Get full text
Monograph -
19
Near infrared palm image acquisition and two-finger valley point-based image extraction for palm vascular pattern detection
Published 2019“…A vascular image enhancement processing comprises of several enhancement techniques were recommended based on their ability in enhancing palm vascular pattern visually. …”
Get full text
Get full text
Thesis -
20
Hazard identification on fractionation column using rule based expert system
Published 2001“…The study has contributed to an improvement of hazard identification technique and proposed an algorithm by considering the whole consequences of process deviation in each stream. …”
Get full text
Get full text
Article
