Search Results - (( java implementation during algorithm ) OR ( user visualization means algorithm ))

Refine Results
  1. 1
  2. 2

    Tag cloud algorithm with the inclusion of personality traits by Supli, Ahmad Affandi, Shiratuddin, Norshuhada, Ab. Aziz, Azizi

    Published 2014
    “…Since there is no study has tried to create an algorithm that can customize tag cloud visual properties based on personality traits. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Pairwise testing tools based on hill climbing algorithm (PTCA) by Lim, Seng Kee

    Published 2014
    “…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  4. 4

    3D graphics visualization for interactive mobile users navigation by Mantoro, Teddy, Abubakar, Adamu, Ayu, Media Anugerah

    Published 2012
    “…The solutions will be provided through implementing an efficient, scalable dynamic entity navigation solution by means of Bi-A* path finding algorithm. As a result, a 3D model of a real place in a mobile device will be produced, for user’s navigation which will makes it easier to perceive proportions, distances, and recognize landmarks, at the same time interacting with other users.…”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Virtual GIS walkthrough Innovation Center / Mohd Sufean Abu Samah by Abu Samah, Mohd Sufean

    Published 1999
    “…Nowadays advances in computer graphics hardware and algorithms, visualization and interactive techniques for analysis offer the components for a high integrated, efficient real-time 3d Virtual GIS. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Enhancing navigation for the visually impaired: a Mamdani type 1 fuzzy logic approach to obstacle detection by Ibharim, Aisyah, Toha, Siti Fauziah, Nordin, Nor Hidayati Diyana, Mohammad O., Tokhi

    Published 2025
    “…Thus, this contribution is a valuable improvement in the field of assistive technologies for visually impaired, providing a more effective means for navigation by the visually impaired.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Visualisasi pohon sintaksis berasaskan model dan algoritma sintaks ayat bahasa Melayu by Yusnita, Muhamad Noor

    Published 2018
    “…User evaluation on the prototype was also performed yielding in the average subjective satisfaction of 87.9% and a mean score of 6.157, based on semantic differential scales of 1 to 7. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Identifying suicidal ideation through twitter sentiment analysis using Naïve Bayes / Annasuha Atie Atirah Alias by Alias, Annasuha Atie Atirah

    Published 2023
    “…The result of the data analysis is visualized into a web application system to enable the analysis results to be interpretable and readable by the user using Plotly visualization tool. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Stock price monitoring system by Ng, Chun Ming

    Published 2024
    “…Consequently, Root Mean Squared Error (RMSE) and Mean Absolute Percentage Error (MAPE) are used to evaluate the performance of the prediction algorithms. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10

    An adaptive HMM based approach for improving e-Learning methods by Deeb B., Hassan Z., Beseiso M.

    Published 2023
    “…This adaptive algorithm can thus be applied to any e-learning platform for optimal content delivery to its users in real-time. © 2014 IEEE.…”
    Conference Paper
  11. 11

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Sentiment Analysis of Sexual Harassment in Malaysia on Twitter Using Machine Learning Algorithms by Nurellezia, Suleiman

    Published 2023
    “…Lastly, the data are visualized using graphs and charts and an overall visualization dashboard is generated for data reporting which helps to analyze and extract meaning behind the sentiments by relating the visualizations with real-life events from legitimate sources such as news and articles. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  13. 13

    Blogs Search Engine Adopting RSS Syndication Using Fuzzy Logic by Mohammed, Athraa Jasim

    Published 2012
    “…The blogs search engine consists of three main phases which are crawling using RSS feeds algorithm, indexing weblogs algorithm and searching technique with Fuzzy logic. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Real-time intelligent recycle waste detection and classification using you only look once version 5 / Aiman Syafwan Amran by Amran, Aiman Syafwan

    Published 2023
    “…The object detection and classification algorithm achieved 91.9% mean average precision in metric evaluation. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Polarization imaging for face spoofing detection: identification of black ethnical group by Abd Aziz, A.Z., Wei, H.

    Published 2018
    “…Then, the Stokes parameters are applied to generate I image for each genuine face and printed photo. Visually, the I of genuine black users seem brighter than the other skin colors. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    An e-voting application using cryptography technology by Chin, Hsin Tien

    Published 2020
    “…Hashing function mainly encrypts the user's confidential information to prevent theft by other users and the encrypt method can be implement from Visual Studio which is SHA-256 (Secure Hash Algorithm- 256 bits), a cryptographic hash function designed by US NSA (United States National Security Agency). …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  18. 18

    Sentiment analysis of restaurant reviews in Kuala Terengganu based on K-Nearest Neighbor/ Siti Syazwana Jafri by Jafri, Siti Syazwana

    Published 2021
    “…The output will be the accuracy of the KNN model and the visualization of sentiment analysis of the new data that user will choose in the prototype. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…The system is capable in operating an off-line programming method, starting from its programming sequences until robotic implementation of the program. During early stages, the research is emphasis more towards designing a robotic system using RoboLab software and C++ programming language. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    The development of cloud modelling and motion analysis for virtual environment by Sunar, Mohd. Shahrizal, Daman, Daut, Kari, Sarudin, Mohd. Suaib, Norhaida, Bade, Abdullah

    Published 2005
    “…This shows its suitability for real time virtual reality applications such as flight simulator and 3D games. The user can pass through the cloud with realistic visual effect. …”
    Get full text
    Get full text
    Monograph