Search Results - (( java data visualization algorithm ) OR ( construct detection based algorithm ))

Search alternatives:

Refine Results
  1. 1

    Enhanced bibliographic data retrieval and visualization using query optimization and spectral centrality measure by Ramasamy, Chitra, Zolkepli, Maslina

    Published 2019
    “…This study proposing an enhance bibliographic data retrieval and visualization using hybrid clustering method consists of K-harmonic mean (KHM) and Spectral Algorithm and eigenvector centrality measure. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin by Nasaruddin, Amir Hambaly

    Published 2019
    “…The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Dynamic force-directed graph with weighted nodes for scholar network visualization by Mohd. Aris, Khalid Al-Walid, Ramasamy, Chitra, Mohd Aris, Teh Noranis, Zolkepli, Maslina

    Published 2022
    “…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
    Get full text
    Get full text
    Article
  4. 4

    Design Of Robot Motion Planning Algorithm For Wall Following Robot by Ali Hassan, Muhamad Khairul

    Published 2006
    “…Computer A will be sent the data to computer B through the internet/LAN using JAVA program. …”
    Get full text
    Get full text
    Monograph
  5. 5

    Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system by Maseer, Ziadoon Kamil

    Published 2022
    “…Recently, researchers suggested a deep belief network (DBN) algorithm to construct and build a network intrusion detection system (NIDS) for detecting attacks that have not been seen before. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Cloud-based lightweight detection of hardhat compliance based on YOLOv5 in power construction site by Wanbo, Luo

    Published 2025
    “…Based on You Only Look Once (YOLO) v5, A cloud-based real-time hardhat-wearing compliance detection system was proposed to detect workers not wearing hardhats in power construction sites. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Enhanced Community Detection Based On Cross Time For Higher Visibility In Supply Chain: A Six-Steps Model Framework by Abal Abas, Zuraida, Mohd Zaki, Nurul Hafizah, Asmai, Siti Azirah, Abdul Rahman, Ahmad Fadzli Nizam, Zainal Abidin, Zaheera

    Published 2019
    “…This paper proposed six steps model framework that aim: (1) To construct the nodes and vertices for temporal graph representing the relationship in supply chain network; (2) To propose an enhanced temporal community detection algorithm in graph analytics based on Cross-time approach and (3) To evaluate the enhanced temporal community detection algorithm in graph analytics for representing relationship in supply chain network based on external and internal quality analysis. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Finding objects with segmentation strategy based multi robot exploration in unknown environment by Arezoumand, Reza, Mashohor, Syamsiah, Marhaban, Mohammad Hamiruce

    Published 2013
    “…Two algorithms were investigated in this paper one is frontier based random search algorithm and the second is efficient algorithm based on segmentation strategy. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    A novel steganography algorithm using edge detection and MPC algorithm by Aref Rezaei, Leili Farzinvash, Ali Farzamnia

    Published 2019
    “…In this paper, we propose an efficient steganography algorithm which applies edge detection and MPC algorithm for data concealment in digital images. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    A Pairwise Test Suite Generator based on Melody Search Algorithm by Toh, S. Yuen, Al-Omoush, Ala’a A., Foo, W. Wen, Goh, G. Hau, Alsewari, Abdulrahman A.

    Published 2016
    “…This paper aims to introduce MS as a pairwise testing strategy called a Pairwise Test suite generator based Melody Search Algorithm (PTMS). A pairwise testing is an operative approach in the combinatorial test suite construction. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Comparison of UAV flying height parameter for crack detection applications / Wan Nurdayini Batrisyia Wan Ghazali by Wan Ghazali, Wan Nurdayini Batrisyia

    Published 2024
    “…Aerial photographs were taken using UAV at various heights and the images were then rectified to get the orthoimages. Next, the DoG algorithm was applied for the detection of visible cracks, and the results were compared with manually outlined cracks to determine the degree of the algorithm’s credibility. …”
    Get full text
    Get full text
    Student Project
  14. 14
  15. 15

    Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed by Aneesa Ali, Ali Saeed

    Published 2017
    “…This model driven approach was integrated with the proposed infeasible path detection method which based on analyzing various OCL constructs and operations. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Real-time Personal Protective Equipment (PPE) compliance detection system using you only look once version 5 / Nur Amielia Natasha Mohamad Nazli by Mohamad Nazli, Nur Amielia Natasha

    Published 2023
    “…The project utilizes the You Only Look Once (YOLO) algorithm as the detection algorithm, namely version 5. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Development Of Machine Learning User Interface For Pump Diagnostics by Lee, Zhao Yang

    Published 2022
    “…Build up a user interface by using Visual Studio Code (VSC) to run the coding of Cascading Style Sheet (CSS), Hyper Text Markup Language (HTML) and JavaScript (JS) as a webpage and connect to Azure Machine Learning Model and this will allow the user from using the model from a webpage when they have active internet with any devices.…”
    Get full text
    Get full text
    Monograph
  18. 18

    The application of suitable sports games for junior high school students based on deep learning and artificial intelligence by Ji, Xueyan, Samsudin, Shamsulariffin, Hassan, Muhammad Zarif, Farizan, Noor Hamzani, Yuan, Yubin, Chen, Wang

    Published 2025
    “…In HMDB51 dataset, the proposed average detection accuracy of ST-GCN action recognition algorithm based on MediaPipe framework reaches 88.3%. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Approach for detecting lane line boundaries / Mamadou Baldeh by Baldeh, Mamadou

    Published 2020
    “…In this paper, previous vision based lane detection studies are reviewed in terms of three aspects, which are lane detection algorithms, integration, and evaluation methods. …”
    Get full text
    Get full text
    Thesis
  20. 20