Search Results - (( knowledge visualization system algorithm ) OR ( java application model algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    High performance visualization of human tumor growth software by Alias, Norma, Mohd. Said, Norfarizan, Khalid, Siti Nur Hidayah, Sin, Dolly Tien Ching, Phang, Tau Ing

    Published 2008
    “…The implementation of parallel algorithm based on parallel computing system is used to visualize the growth of human tumour. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7
  8. 8

    Tag cloud algorithm with the inclusion of personality traits by Supli, Ahmad Affandi, Shiratuddin, Norshuhada, Ab. Aziz, Azizi

    Published 2014
    “…Since there is no study has tried to create an algorithm that can customize tag cloud visual properties based on personality traits. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Decision tree as knowledge management tool in image classification by Kusrini, , Harjoko, Agus

    Published 2008
    “…Expert System has been grown so fast as a science that study how to make computer capable of solving problems that typically can only be solved by expert.It has been realized that the biggest challenge of developing expert system is the process include expert’s knowledge into the system.This research tries to model expert’s knowledge management using case based reasoning method.The knowledge itself is not inputted directly by the expert, but rather the system will learn the knowledge from what the expert did to the previous cases.This research takes image classification as the problem to be solved.As the knowledge development technique, we build decision tree by using C4.5 algorithm.Variables used for building the decision tree are the image visual features.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…In this type of environment it is nearly impossible to prove the effectiveness of a scheduling algorithm. Hence the main objective of this study is to develop a desktop grid simulator toolkit for measuring and modeling scheduler algorithm performance. …”
    Get full text
    Get full text
    Final Year Project
  13. 13

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…This thesis describes original research in the field of software quality model by presenting a Feature Ranking Algorithm (FRA) for Pragmatic Quality Factor (PQF) model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17

    Hazard identification on fractionation column using rule based expert system by Mohd Yunus, Mohd Yusri, Ali, Mohamad Wijayanuddin

    Published 2001
    “…The algorithm is found applicable for any of process system, however the expert system developed is only limited to the application for fractionation column of oleo chemical plant.…”
    Get full text
    Get full text
    Article
  18. 18

    Ciphercrypt-an Encryption System / Nor Hidayah Ngah by Nor Hidayah, Ngah

    Published 2004
    “…This system is implemented on a Windows platform with Visual Basic as a programming language and 3-DES as a main encryption algorithm. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Classification of Cardiac Disorders Based on Electrocardiogram Data with Fuzzy Cognitive Map (FCM) Algorithm Approach by Sumiati, ., Hoga, Saragih, T.K.A, Rahman, Viktor Vekky, Ronald Repi, Agung, Triayudi

    Published 2021
    “…FCM itself is a form of knowledge representation, design elements, and algorithm de�scriptions that are included in the FCM Expert software. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20