Search Results - (( java implementation mechanism algorithm ) OR ( data visualisation using algorithm ))
Search alternatives:
- implementation mechanism »
- java implementation »
- mechanism algorithm »
- visualisation using »
- data visualisation »
- using algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
Get full text
Get full text
Final Year Project -
2
Multi-dimensional Data Visualisation using Mobile Augmented Reality
Published 2020“…Therefore, this algorithm uses AR to provide a multi-display solution for improved data visualisation after processing, summarising and classifying data. …”
Get full text
Get full text
Get full text
Article -
3
Effectiveness of silhouette rendering algorithms in terrain visualisation
Published 2002“…Silhouette Rendering Algorithms have been successfully used in various applications such as communicating shape and cartoon rendering.This paper explores how effective silhouette rendering algorithms could be used in terrain visualisation. …”
Get full text
Get full text
Conference or Workshop Item -
4
Visualisation System of COVID-19 Data in Malaysia
Published 2021“…This study aims to provide a system, using COVID-19 data as a sample to visualise and analyse cases, deaths, discharged ICU cases updates in Malaysia as a whole state wise of COVID-19 daily statistics. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
3D terrain visualisation for GIS: A comparison of different techniques
Published 2011“…The results of this paper will be of help to the users in identifying the best technique of terrain visualisation suitable for GIS data.…”
Get full text
Get full text
Book Section -
6
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
7
Visualisation System of COVID-19 Data in Malaysia
Published 2021“…This study aims to provide a system, using COVID-19 data as a sample to visualise and analyse cases, deaths, discharged ICU cases updates in Malaysia as a whole state wise of COVID-19 daily statistics. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The correctness of the proposed protocol is demonstrated in a simulation model developed in JAVA TCP/IP socket. Next, the proposed protocol is implemented in RFID system including IAIK UHF Demo tag, TagSense Nano-UHF reader and back-end database. …”
Get full text
Get full text
Thesis -
9
A COMPARISON STUDY OF DATA CLUSTERING AND VISUALISATION TECHNIQUES WITH VARIOUS DATA TYPES
Published 2020“…Clustering is used to identify the intrinsic grouping of a set of unlabelled data. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
10
Implementation of RIO in UMJaNetSim / Chan Chin We
Published 2004“…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
Get full text
Get full text
Thesis -
11
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
Review -
12
A case study : 2D Vs 3D parallel differential equation toward tumor cell detection on multi-core parallel computing atmosphere
Published 2010“…In order to detect tumour cells, 2D and 3D Partial Differential Equations (PDE) are considered and compared by using Multi-Core parallel computing atmosphere with visualisation, communication and data analysis. …”
Get full text
Get full text
Get full text
Article -
13
The efficacy of personal computer (PC) AI image enhancer software on low and high contrast PA chest radiograph: an experimental study
Published 2026“…Methods: An experimental investigation was undertaken using five PC AI image enhancer programs to visualise the thoracic anatomy. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Dynamic modeling by usage data for personalization systems
Published 2009Get full text
Get full text
Conference or Workshop Item -
15
Improving Class Timetabling using Genetic Algorithm
Published 2006“…Hence, the major aim of this research is to investigate the internal mechanism of genetic algorithm in solving and improving class timetabling problem. …”
Get full text
Get full text
Get full text
Thesis -
16
PREDICTION OF HFMD DISEASE OUTBREAK FROM TWITTER
Published 2019“…This is because both Naive Bayes and SVM are baseline algorithm used in text classification. In the end, a visualisation of HFMD Disease Map is presented to visualize the city that suffer HFMD outbreak using geo-located tweet that related with HFMD. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
17
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
Get full text
Get full text
Conference or Workshop Item -
18
Secured agriculture sensor data based on end-to-end encryption using raspberry pi
Published 2025“…This project addresses these security concerns by developing a secure data collection and visualisation system using Raspberry Pi and Node-RED. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
-
20
