Search Results - (( parallel optimization path algorithm ) OR ( data visualisation based algorithm ))
Search alternatives:
- parallel optimization »
- visualisation based »
- data visualisation »
- optimization path »
- path algorithm »
-
1
Tool path generation of contour parallel based on ant colony optimisation
Published 2016“…An Ant Colony Optimisation (ACO) method is used to optimize the tool path length because of its capability to find the shortest tool path length. …”
Get full text
Get full text
Article -
2
Minimizing machining airtime motion with an ant colony algorithm
Published 2016Get full text
Get full text
Article -
3
Multi-dimensional Data Visualisation using Mobile Augmented Reality
Published 2020“…Therefore, this algorithm uses AR to provide a multi-display solution for improved data visualisation after processing, summarising and classifying data. …”
Get full text
Get full text
Get full text
Article -
4
-
5
-
6
A COMPARISON STUDY OF DATA CLUSTERING AND VISUALISATION TECHNIQUES WITH VARIOUS DATA TYPES
Published 2020“…Clustering is used to identify the intrinsic grouping of a set of unlabelled data. It can be applied in data mining exploration and statistical data analysis. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
7
-
8
Restoration planning strategy of transmission system based on optimal energizing time of sectionalizing islands / Dian Najihah Abu Talib
Published 2019“…There are two discrete optimization techniques used in this work, which are the Artificial Bee Colony algorithm and Evolutionary Programming. …”
Get full text
Get full text
Get full text
Thesis -
9
3D terrain visualisation for GIS: A comparison of different techniques
Published 2011“…The results of this paper will be of help to the users in identifying the best technique of terrain visualisation suitable for GIS data.…”
Get full text
Get full text
Book Section -
10
Dynamic modeling by usage data for personalization systems
Published 2009Get full text
Get full text
Conference or Workshop Item -
11
Secured agriculture sensor data based on end-to-end encryption using raspberry pi
Published 2025“…The system integrates multiple robust encryption algorithms—AES-128, AES-256, ChaCha20, and Twofish—for end-to-end data protection. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
-
13
A novel large-bit-size architecture and microarchitecture for the implementation of Superscalar Pipeline VLIW microprocessors
Published 2008“…Different adder architectures are investigated for suitability on synthesis implementation of large data bus size adder for efficient usage within the ALU. An adder algorithm using repetitive constructs in a parallel algorithm that allows for efficient and optimal synthesis for large data bus size is proposed as a suitable implementation for the adder within the ALU. …”
Get full text
Thesis -
14
-
15
PREDICTION OF HFMD DISEASE OUTBREAK FROM TWITTER
Published 2019“…Based on the Map visualisation, Malaysia is predicted to face HFMD outbreak in the period between January until March for the coming years. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
16
Correlation analysis and predictive performance based on KNN and decision tree with augmented reality for nuclear primary cooling process / Ahmad Azhari Mohamad Nor
Published 2024“…Firstly, descriptive and correlation analyses characterise the primary cooling system based on temperature, flow, and conductivity data. …”
Get full text
Get full text
Thesis -
17
Composing multi-relations association rules from crowdsourcing remuneration data
Published 2022“…To gain a more understandable insight, the data relationship is visualised using an alluvial chart that manages to illustrate the flow. …”
Get full text
Get full text
Get full text
Article -
18
A 'snowflake' geometrical representation for optimised degree six 3-modified chordal ring networks
Published 2016“…A tree visualisation was constructed based on its connectivity to enable the generation of formulae for optimal diameter and average optimal path lengths. …”
Get full text
Get full text
Conference or Workshop Item -
19
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
Get full text
Get full text
Get full text
Thesis -
20
Twitter sentiment analysis of Malaysian fast food restaurant chains: a novel approach to understand customer perception using Naïve Bayes / Muhammad Hafeez Hakimi Muhd Zahidi Ridzu...
Published 2023“…This study introduces a web-based system that uses Twitter sentiment analysis to visualise reviews of Malaysian fast-food restaurants. …”
Get full text
Get full text
Book Section
