Search Results - (( knowledge visualization implementation algorithm ) OR ( java effective construction algorithm ))
Search alternatives:
- visualization implementation »
- implementation algorithm »
- knowledge visualization »
- effective construction »
- construction algorithm »
- java »
-
1
High performance visualization of human tumor growth software
Published 2008“…The result of finite difference approximation (explicit, Crank-Nicolson and fully implicit methods) will be presented graphically. The implementation of parallel algorithm based on parallel computing system is used to visualize the growth of human tumour. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011“…Moreover,this application will be using the programming language Visual Basic. Net applied in Visual Studio 2008.The methodology has chosen is rapid application development (RAD) where this method is the archive with apparel search requirement. …”
Get full text
Get full text
Undergraduates Project Papers -
3
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011“…Moreover,this application will be using the programming language Visual Basic. Net applied in Visual Studio 2008.The methodology has chosen is rapid application development (RAD) where this method is the archive with apparel search requirement. …”
Get full text
Get full text
Undergraduates Project Papers -
4
Teaching and learning via chatbots with immersive and machine learning capabilities
Published 2019“…Each of these chatbots focuses on different programming concepts or constructs. These chatbots support learning of Java via problem-solving steps through “learning by doing”. …”
Get full text
Get full text
Conference or Workshop Item -
5
Ciphercrypt-an Encryption System / Nor Hidayah Ngah
Published 2004“…This system is implemented on a Windows platform with Visual Basic as a programming language and 3-DES as a main encryption algorithm. …”
Get full text
Get full text
Thesis -
6
Fuzzy logic controller for an automatic car gearbox shifting
Published 2009“…The Fuzzy Logic components that were implemented included the fuzzification, knowledge base, inference engines and defuzzification. …”
Get full text
Get full text
Undergraduates Project Papers -
7
Kernerlized Correlation Filters Parameters Optimization For Enhanced Visual Tracking
Published 2017“…Until now, there are still no perfect algorithm to track the target flawlessly. In order to improve the performance, the main idea proposed is implementing optimization technique on the selected parameters and obtain a better performance. …”
Get full text
Get full text
Monograph -
8
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…The research’s primary objective is to construct a framework for prioritising test cases in regression testing using swarm intelligence that enhances test efficiency and effectiveness. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Sentiment analysis of customer review for Tina Arena Beauty
Published 2025“…Future work may involve expanding the dataset, integrating real-time feedback systems, and evaluating advanced algorithms to improve classification performance further. …”
Get full text
Get full text
Student Project -
10
Nested repetitive structure techniques in examination seating number allocation process at UiTM Pulau Pinang branch / Jamal Othman, Rozita Kadar and Naemah Abdul Wahab
Published 2020“…To automate the process of assigning the seating numbers, an algorithm was designed and constructed using the nested repetitive or looping structure techniques with JAVA programming language. …”
Get full text
Get full text
Get full text
Article -
11
Multi-modality ontology semantic image retrieval with user interaction model / Mohd Suffian Sulaiman
Published 2020“…This semantic technology is chosen due to the ability to mine, interpret and organise the knowledge. Ontology can be seen as a knowledge base that can be used to improve the image retrieval process with the aim of reducing the semantic gap between visual features and high-level semantics. …”
Get full text
Get full text
Thesis -
12
Measuring Enterprise Architecture / Siti Fatimah Azzahra Ibrahim
Published 2016Get full text
Get full text
Thesis -
13
Friendship Degree and Tenth Man Strategy: A new method for differentiating between erroneous readings and true events in wireless sensor networks
Published 2023“…FD-TMS was comprehensively assessed in a simulation environment utilizing a performance analysis tool constructed on Java. The results were compared to the baseline algorithm, highlighting key parameters like false alarms and event detection accuracy. …”
Get full text
Get full text
Article -
14
P300 detection of brain signals using a combination of wavelet transform techniques
Published 2012“…This research is proving the power of combination of discrete and continuous wavelet transform for achieving high accuracy in single trial detection and visualization of P300. Meanwhile the new approaches in channels selection methods help the algorithms for convenient online usage.…”
Get full text
Get full text
Thesis -
15
Use of hybrid classification algorithm for land use and land cover analysis in data scarce environment
Published 2013“…In this study, vegetation indices, tasseled cap transformation, hybrid classification as a combination of k-means and support vector machine algorithms,and post-classification comparison were respectively implemented to detect and assess LULC in Halabja. …”
Get full text
Get full text
Thesis -
16
Review on computational strategies for bi-layered metal powder compaction
Published 2024“…A scrutinize part is the implementation of algorithm to describe powder behavior under double loading as well as to relate with other mechanical variables that eventually require expertise on computational plasticity knowledges involving horizontal contacts. …”
Get full text
Get full text
Get full text
Book Section -
17
-
18
Constrained clustering approach to aid in remodularisation of object-oriented software systems / Chong Chun Yong
Published 2016“…Effective execution of software maintenance requires knowledge of the detailed working of software. …”
Get full text
Get full text
Thesis -
19
EEG-Based Person Authentication Modelling Using Incremental Fuzzy-Rough Nearest Neighbour Technique
Published 2016“…Fuzzy-Rough Nearest Neighbours (FRNN) technique is an outstanding technique to model uncertainty under an imperfect data condition. The current implementation of FRNN technique is not designed for incremental learning problem because there is no update function to incrementally reshape and reform the existing knowledge granules. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Security alert framework using dynamic tweet-based features for phishing detection on twitter
Published 2019“…This framework is divided into three phases which are classification model of phishing detection, detection algorithm of phishing tweet detection and security alert mechanism of phishing tweet detection. …”
Get full text
Get full text
Thesis
