Search Results - (( java data visualization algorithm ) OR ( construct validity technique algorithm ))
Search alternatives:
- data visualization »
- construct validity »
- validity technique »
- java »
-
1
Enhanced bibliographic data retrieval and visualization using query optimization and spectral centrality measure
Published 2019“…This study proposing an enhance bibliographic data retrieval and visualization using hybrid clustering method consists of K-harmonic mean (KHM) and Spectral Algorithm and eigenvector centrality measure. …”
Get full text
Get full text
Get full text
Article -
2
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
Get full text
Get full text
Thesis -
3
Dynamic force-directed graph with weighted nodes for scholar network visualization
Published 2022“…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
Get full text
Get full text
Article -
4
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006“…Computer A will be sent the data to computer B through the internet/LAN using JAVA program. …”
Get full text
Get full text
Monograph -
5
A Distributed Energy Aware Connected Dominating Set Technique for Wireless Sensor Networks
Published 2012Get full text
Get full text
Conference or Workshop Item -
6
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
A new protocol of dual deniability encryption techniques based on asymmetric secret sharing method / Mohsen Mohamad Hata
Published 2019“…The protocol defines the procedures which engage two layers of deniability techniques; namely Secret Sharing and Valid Fake Messages. …”
Get full text
Get full text
Thesis -
8
A Comparison Study On Pca_Modular Pca And Lda For Face Recognition
Published 2017Get full text
Get full text
Monograph -
9
-
10
Optimization of medical image steganography using n-decomposition genetic algorithm
Published 2023“…To overcome these limitations, this study proposes a technique known as an n-decomposition genetic algorithm. …”
Get full text
Get full text
Get full text
Thesis -
11
Strategies for effective value management practice in construction industry
Published 2017“…The objectives were to develop a new optimisation algorithm and apply the results to control construction project costs. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
Published 2019“…The Hybrid Cube Encryption Algorithm (HiSea) has been implemented to validate the encryption keys that are generated from the proposed algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Effective gene selection techniques for classification of gene expression data
Published 2005“…The proposed approach is validated using leave one out cross validation (LOOCV). …”
Get full text
Get full text
Thesis -
14
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…Build up a user interface by using Visual Studio Code (VSC) to run the coding of Cascading Style Sheet (CSS), Hyper Text Markup Language (HTML) and JavaScript (JS) as a webpage and connect to Azure Machine Learning Model and this will allow the user from using the model from a webpage when they have active internet with any devices.…”
Get full text
Get full text
Monograph -
15
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…The study on related work and comparison of algorithm also has been done in this phase. In Design phase, the use case diagram, whole system flowchart and subsystem flowchart has been constructed to assist the development of this web tool. …”
Get full text
Get full text
Thesis -
16
Tacit knowledge for business intelligence framework using cognitive-based approach
Published 2022“…The framework was tested on 23 librarians from several university libraries in West Java and Yogyakarta, Indonesia. The algorithm starts with a content targeted interview to identify the list of problems faced by librarians. …”
Get full text
Get full text
Thesis -
17
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…MATLAB 2017b, a reliable simulation method, was utilised throughout the construction and validation of the algorithm. The performance of the recommended approach makes it possible to thwart an attack using brute force considerably more fast than is possible with the encryption technologies that are currently in use. …”
Get full text
Get full text
Get full text
Thesis -
18
Development of durian ontology from unstructured text and external knowledge source / Khairul Nurmazianna Ismail
Published 2014“…Techniques to determine the scope of ontology is by construction competency questions. …”
Get full text
Get full text
Thesis -
19
Comparison of CPU damage prediction accuracy between certainty factor and forward chaining techniques
Published 2024“…The suggested algorithm yields the mean accuracy of the certainty factor approach in diagnosing computer damage utilizing the constructed system. …”
Get full text
Get full text
Get full text
Article -
20
An Arabic hadith text classification model using convolutional neural network and support vector machine / Mohd Irwan Mazlin
Published 2022“…Fourth, the model is being tested using different stemming techniques, and it found that the model using non-stemming techniques gives higher accuracy with 92%. …”
Get full text
Get full text
Thesis
