Search Results - (( java data visualization algorithm ) OR ( construct validity tree algorithm ))

Search alternatives:

  • Showing 1 - 19 results of 19
Refine Results
  1. 1

    Hyper-Heuristic Evolutionary Approach for Constructing Decision Tree Classifiers by Kumar, Sunil, Ratnoo, Saroj, Vashishtha, Jyoti

    Published 2021
    “…Finding optimal values for the hyper parameters of a decision tree construction algorithm is a challenging issue. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3
  4. 4

    A genetic algorithm approach to VLSI macro cell non-slicing floorplans using binary tree by Rahim At Samsuddin, H. A., Ab. Rahman, A. A. H., Andaljayalakshmi, G., Ahmad, R. B.

    Published 2008
    “…This paper proposes an optimization approach for macro-cell placement which minimizes the chip area size. A binary tree method for non-slicing tree construction process is utilized for the placement and area optimization of macro-cell layout in very large scaled integrated (VLSI) design. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    Enhanced bibliographic data retrieval and visualization using query optimization and spectral centrality measure by Ramasamy, Chitra, Zolkepli, Maslina

    Published 2019
    “…This study proposing an enhance bibliographic data retrieval and visualization using hybrid clustering method consists of K-harmonic mean (KHM) and Spectral Algorithm and eigenvector centrality measure. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin by Nasaruddin, Amir Hambaly

    Published 2019
    “…The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Dynamic force-directed graph with weighted nodes for scholar network visualization by Mohd. Aris, Khalid Al-Walid, Ramasamy, Chitra, Mohd Aris, Teh Noranis, Zolkepli, Maslina

    Published 2022
    “…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
    Get full text
    Get full text
    Article
  9. 9

    Design Of Robot Motion Planning Algorithm For Wall Following Robot by Ali Hassan, Muhamad Khairul

    Published 2006
    “…Computer A will be sent the data to computer B through the internet/LAN using JAVA program. …”
    Get full text
    Get full text
    Monograph
  10. 10

    Theory-guided machine learning for predicting and minimising surface settlement caused by the excavation of twin tunnels / Chia Yu Huat by Chia , Yu Huat

    Published 2024
    “…Shield machines, like earth pressure balance and slurry machines, are pivotal in modern tunnel construction. However, twin tunnel construction in urban areas commonly faces surface settlement (SS) issues, which threaten nearby structures. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Development Of Machine Learning User Interface For Pump Diagnostics by Lee, Zhao Yang

    Published 2022
    “…Build up a user interface by using Visual Studio Code (VSC) to run the coding of Cascading Style Sheet (CSS), Hyper Text Markup Language (HTML) and JavaScript (JS) as a webpage and connect to Azure Machine Learning Model and this will allow the user from using the model from a webpage when they have active internet with any devices.…”
    Get full text
    Get full text
    Monograph
  13. 13

    Tacit knowledge for business intelligence framework using cognitive-based approach by Surbakti, Herison

    Published 2022
    “…The framework was tested on 23 librarians from several university libraries in West Java and Yogyakarta, Indonesia. The algorithm starts with a content targeted interview to identify the list of problems faced by librarians. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Complex word identification model for lexical simplification in the Malay language for non-native speakers by Salehah, Omar

    Published 2023
    “…This study consists of three modules, i) A Malay CWI dataset, ii) Malay CWI features with the new enhanced stemmer rules, and iii) A CWI model based on the Gradient Boosted Tree (GB) algorithm. The model is evaluated based on a state-of-the-art Malay corpus. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    A framework for classification software security using common vulnerabilities and exposures by Hassan, Nor Hafeizah

    Published 2018
    “…This inclusive of the investigation of vulnerability classification objectives,processes,classifiers and focus domains among prominent framework.Final step is to construct the framework by establishing the formal presentation of the vulnerability classification algo-rithm.The validation process was conducted empirically using statistical method to assess the accuracy and consistency by using the precision and recall rate of the algorithm on five data sets each with 500 samples.The findings show a significant result with precision's error rate or p value is between 0.01 and 0.02 with error rate for recall's error rate is between 0.02 and 0.04.Another validation was conducted to verify the correctness of the classification by using expert opinions,and the results showed that the ambiguity of several cases were subdue. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Machine Learning based Predictive Modelling of Cybersecurity Threats Utilising Behavioural Data by Ting, Tin Tin, Khiew, Jie Xin, Ali Aitizaz, Lee, Kuok Tiung, Teoh, Chong Keat, Hasan Sarwar

    Published 2023
    “…The algorithms are used to construct, test, and validate three categories of cybercrime threat (Malware, Social Engineering, and Password Attack) predictive models. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…Prototypes, simulations, observations and interviews were used as the data gathering methods. An offline FOA Java simulation was carried out to evaluate the capability of the MRA method in preventing FOA attack. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    CSQUiD: an index and non-probability framework for constrained skyline query processing over uncertain data by Lawal, Ma'aruf Mohammed, Ibrahim, Hamidah, Mohd Sani, Nor Fazlida, Yaakob, Razali, Alwan, Ali A.

    Published 2024
    “…Given a collection of objects with uncertain data, the CSQUiD framework constructs the minimum bounding rectangles (MBRs) by employing the X-tree indexing structure. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Modeling of mechanical properties of silica fume-based green concrete using machine learning techniques by Nafees, A., Amin, M.N., Khan, K., Nazir, K., Ali, M., Javed, M.F., Aslam, F., Musarat, M.A., Vatin, N.I.

    Published 2022
    “…ML algorithms are used to predict SFC compressive strength to promote the use of green concrete. …”
    Get full text
    Get full text
    Article