Search Results - (( java data visualization algorithm ) OR ( program validation site algorithm ))

Refine Results
  1. 1

    Enhanced bibliographic data retrieval and visualization using query optimization and spectral centrality measure by Ramasamy, Chitra, Zolkepli, Maslina

    Published 2019
    “…This study proposing an enhance bibliographic data retrieval and visualization using hybrid clustering method consists of K-harmonic mean (KHM) and Spectral Algorithm and eigenvector centrality measure. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    An approach for cross-site scripting detection and removal based on genetic algorithms. by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia

    Published 2014
    “…The proposed approach is, so far, only implemented and validated on Java-based Web applications, although it can be implemented in other programming languages with slight modifications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin by Nasaruddin, Amir Hambaly

    Published 2019
    “…The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Cross-site scripting detection based on an enhanced genetic algorithm by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty

    Published 2015
    “…The proposed approach is, so far, only implemented and validated on Java-based Web applications, although it can be implemented in other programming languages with slight modifications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Dynamic force-directed graph with weighted nodes for scholar network visualization by Mohd. Aris, Khalid Al-Walid, Ramasamy, Chitra, Mohd Aris, Teh Noranis, Zolkepli, Maslina

    Published 2022
    “…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
    Get full text
    Get full text
    Article
  6. 6

    Hybrid Spatial-Artificial Intelligence Approach for Renewable Energy Sources Sites Identification and Integration in Sarawak State by Far Chen, Jong

    Published 2022
    “…The minimum total distances in all four cases are acquired and validated as both the TSP-GA algorithm and the Traveling Salesman Problem-Mixed Integer Linear Programming (TSP-MILP) algorithm produced the same routing pattern. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Design Of Robot Motion Planning Algorithm For Wall Following Robot by Ali Hassan, Muhamad Khairul

    Published 2006
    “…Computer A will be sent the data to computer B through the internet/LAN using JAVA program. …”
    Get full text
    Get full text
    Monograph
  8. 8

    A Framework for Green Energy Resources Identification and Integration Supported by Real-Time Monitoring, Control, and Automation Applications by Far Chen, Jong

    Published 2025
    “…The proposed method demonstrated a 69.01 % alignment when validated against the weighted sum method. Following site identification, an improved Geographical Information System-driven fuzzy Traveling Salesman Problem-Binary Integer Programming algorithm was proposed to integrate these sites into a reliable ring-based system topology, aiming to achieve a zero-carbon footprint. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    AI recommendation penetration testing tool for cross-site scripting: support vector machine algorithm by Salim, Nur Saadah, Saad, Shahadan

    Published 2025
    “…This research introduces a new approach to enhancing cybersecurity by integrating Support Vector Machine (SVM) algorithms with penetration testing to develop a recommendation system focused on Cross-Site Scripting (XSS) attack detection. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Construction Noise Prediction Using Stochastic Deep Learning by Ooi, Wei Chien

    Published 2022
    “…The deep learning model was trained with stochastic data to predict the noise levels emitted from the construction site. The programming algorithm of stochastic modelling was executed in MATLAB, whereas the deep learning model was established by using Python 3.6 programming language in Spyder. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12

    Development Of Machine Learning User Interface For Pump Diagnostics by Lee, Zhao Yang

    Published 2022
    “…Build up a user interface by using Visual Studio Code (VSC) to run the coding of Cascading Style Sheet (CSS), Hyper Text Markup Language (HTML) and JavaScript (JS) as a webpage and connect to Azure Machine Learning Model and this will allow the user from using the model from a webpage when they have active internet with any devices.…”
    Get full text
    Get full text
    Monograph
  13. 13

    Tacit knowledge for business intelligence framework using cognitive-based approach by Surbakti, Herison

    Published 2022
    “…The framework was tested on 23 librarians from several university libraries in West Java and Yogyakarta, Indonesia. The algorithm starts with a content targeted interview to identify the list of problems faced by librarians. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Identifying The Ethical Issues In Twitter: A Knowledge Acquisition For Ontology by Mohamad Hafizuddin Mohamed Najid, Zahidah Zulkifli, Roslina Othman, Rohaiza Rokis, Ashraf Ali Salahuddin

    Published 2024
    “…Using a simple algorithm in R programming and 43 keywords based on Ibn Khaldun’s thoughts, 1075 public tweets have been extracted from Twitter as a sample of ethical issues. …”
    Article
  16. 16

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…Cross-Site Scripting (XSS) vulnerabilities are among the most common and most serious security vulnerabilities in Web applications. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Identifying the ethical issues in Twitter: a knowledge acquisition for ontology by Mohamed Najid, Mohamad Hafizuddin, Zulkifli, Zahidah, Othman, Roslina, Rokis, Rohaiza, Salahuddin, Ashraf Ali,

    Published 2021
    “…Using a simple algorithm in R programming and 43 keywords based on Ibn Khaldun’s thoughts, 1075 public tweets have been extracted from Twitter as a sample of ethical issues. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…Prototypes, simulations, observations and interviews were used as the data gathering methods. An offline FOA Java simulation was carried out to evaluate the capability of the MRA method in preventing FOA attack. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Reservoir Inflow Forecasting Using Artificial Neural Network and Adaptive Neuro-Fuzzy Inference System Techniques by Googhari, Shahram Karimi

    Published 2007
    “…The 6 years daily data from 1995-1997 and 2002-2004 were used for training and validation of the models. Cross validation of training and validation data sets was also considered to obtain the best data set. …”
    Get full text
    Get full text
    Thesis
  20. 20

    MicroRNA regulation of human choline kinase gene expression by Ling, Few Ling

    Published 2019
    “…MiRNAs binding was predicted by several online computer programs that utilize different algorithms. Potential miRNAs were selected for the synthesis of their mimics and transfected into cancer cell lines. …”
    Get full text
    Get full text
    Article