Search Results - (( knowledge visualization implementation algorithm ) OR ( java effective construction algorithm ))

Refine Results
  1. 1

    High performance visualization of human tumor growth software by Alias, Norma, Mohd. Said, Norfarizan, Khalid, Siti Nur Hidayah, Sin, Dolly Tien Ching, Phang, Tau Ing

    Published 2008
    “…The result of finite difference approximation (explicit, Crank-Nicolson and fully implicit methods) will be presented graphically. The implementation of parallel algorithm based on parallel computing system is used to visualize the growth of human tumour. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Thalassaemia detection using CBR Algorithm via mobile device by Nur Faezah, Omar

    Published 2011
    “…Moreover,this application will be using the programming language Visual Basic. Net applied in Visual Studio 2008.The methodology has chosen is rapid application development (RAD) where this method is the archive with apparel search requirement. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3

    Thalassaemia detection using CBR Algorithm via mobile device by Nur Faezah, Omar

    Published 2011
    “…Moreover,this application will be using the programming language Visual Basic. Net applied in Visual Studio 2008.The methodology has chosen is rapid application development (RAD) where this method is the archive with apparel search requirement. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  4. 4

    Teaching and learning via chatbots with immersive and machine learning capabilities by Nantha Kumar Subramaniam

    Published 2019
    “…Each of these chatbots focuses on different programming concepts or constructs. These chatbots support learning of Java via problem-solving steps through “learning by doing”. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Ciphercrypt-an Encryption System / Nor Hidayah Ngah by Nor Hidayah, Ngah

    Published 2004
    “…This system is implemented on a Windows platform with Visual Basic as a programming language and 3-DES as a main encryption algorithm. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Fuzzy logic controller for an automatic car gearbox shifting by Norafiza, Mohd Hassim

    Published 2009
    “…The Fuzzy Logic components that were implemented included the fuzzification, knowledge base, inference engines and defuzzification. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  7. 7

    Kernerlized Correlation Filters Parameters Optimization For Enhanced Visual Tracking by Ong, Chor Keat

    Published 2017
    “…Until now, there are still no perfect algorithm to track the target flawlessly. In order to improve the performance, the main idea proposed is implementing optimization technique on the selected parameters and obtain a better performance. …”
    Get full text
    Get full text
    Monograph
  8. 8

    A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm by Ba-Quttayyan, Bakr Salim Abdullah

    Published 2024
    “…The research’s primary objective is to construct a framework for prioritising test cases in regression testing using swarm intelligence that enhances test efficiency and effectiveness. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Sentiment analysis of customer review for Tina Arena Beauty by Amri, Nur Najwa Shahirah

    Published 2025
    “…Future work may involve expanding the dataset, integrating real-time feedback systems, and evaluating advanced algorithms to improve classification performance further. …”
    Get full text
    Get full text
    Student Project
  10. 10

    Nested repetitive structure techniques in examination seating number allocation process at UiTM Pulau Pinang branch / Jamal Othman, Rozita Kadar and Naemah Abdul Wahab by Othman, Jamal, Kadar, Rozita, Abdul Wahab, Naemah

    Published 2020
    “…To automate the process of assigning the seating numbers, an algorithm was designed and constructed using the nested repetitive or looping structure techniques with JAVA programming language. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Multi-modality ontology semantic image retrieval with user interaction model / Mohd Suffian Sulaiman by Sulaiman, Mohd Suffian

    Published 2020
    “…This semantic technology is chosen due to the ability to mine, interpret and organise the knowledge. Ontology can be seen as a knowledge base that can be used to improve the image retrieval process with the aim of reducing the semantic gap between visual features and high-level semantics. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Friendship Degree and Tenth Man Strategy: A new method for differentiating between erroneous readings and true events in wireless sensor networks by Adday, Ghaihab Hassan, Subramaniam, Shamala K., Zukarnain, Zuriati Ahmad, Samian, Normalia

    Published 2023
    “…FD-TMS was comprehensively assessed in a simulation environment utilizing a performance analysis tool constructed on Java. The results were compared to the baseline algorithm, highlighting key parameters like false alarms and event detection accuracy. …”
    Get full text
    Get full text
    Article
  14. 14

    P300 detection of brain signals using a combination of wavelet transform techniques by Motlagh, Farid Esmaeili

    Published 2012
    “…This research is proving the power of combination of discrete and continuous wavelet transform for achieving high accuracy in single trial detection and visualization of P300. Meanwhile the new approaches in channels selection methods help the algorithms for convenient online usage.…”
    Get full text
    Get full text
    Thesis
  15. 15

    Use of hybrid classification algorithm for land use and land cover analysis in data scarce environment by Al-Doski, Jwan M. Mohammed

    Published 2013
    “…In this study, vegetation indices, tasseled cap transformation, hybrid classification as a combination of k-means and support vector machine algorithms,and post-classification comparison were respectively implemented to detect and assess LULC in Halabja. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Review on computational strategies for bi-layered metal powder compaction by Mohd Tahir, Suraya, Mohd Yusoff, Syamimi, Mohamed Ariff, Azmah Hanim, Supeni, Eris Elliandy, Anuar, Mohd Shamsul

    Published 2024
    “…A scrutinize part is the implementation of algorithm to describe powder behavior under double loading as well as to relate with other mechanical variables that eventually require expertise on computational plasticity knowledges involving horizontal contacts. …”
    Get full text
    Get full text
    Get full text
    Book Section
  17. 17
  18. 18

    Constrained clustering approach to aid in remodularisation of object-oriented software systems / Chong Chun Yong by Chong, Chun Yong

    Published 2016
    “…Effective execution of software maintenance requires knowledge of the detailed working of software. …”
    Get full text
    Get full text
    Thesis
  19. 19

    EEG-Based Person Authentication Modelling Using Incremental Fuzzy-Rough Nearest Neighbour Technique by Liew, Siaw Hong

    Published 2016
    “…Fuzzy-Rough Nearest Neighbours (FRNN) technique is an outstanding technique to model uncertainty under an imperfect data condition. The current implementation of FRNN technique is not designed for incremental learning problem because there is no update function to incrementally reshape and reform the existing knowledge granules. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Security alert framework using dynamic tweet-based features for phishing detection on twitter by Liew, Seow Wooi

    Published 2019
    “…This framework is divided into three phases which are classification model of phishing detection, detection algorithm of phishing tweet detection and security alert mechanism of phishing tweet detection. …”
    Get full text
    Get full text
    Thesis