Search Results - (( parameters data visualization algorithm ) OR ( java implementation some algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Visual Simultaneous Localization and Mapping Using Direct-Based Method for Unmanned Aerial Vehicle (UAV) by M. H., Badzli, N., Mohamad Yatim, A., Jamaludin, Z., Mohd Noh, M. I., Idris, N. A., Sulaiman, Nur Aqilah, Othman

    Published 2023
    “…The main studies in this project are focusing on the experimentation for DSO algorithm parameter setting. Another objective is to evaluate the parameter and performance of DSO algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS. by FAROOQ, HUMERA

    Published 2012
    “…The aim of the proposed approach is to study the benefit of using visualization techniques to explorer Genetic Algorithm data based on gene values. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Buildthermo: an algorithm for visualizing building heat dynamics / Amira Shazlin Adnan ... [et al.] by Adnan, Amira Shazlin, Che Ani, Adi Irfan, Mohd Pahroraji, Mohamad Ezad Hafez, Ayob, Mohd Asraf, Wahi, Noraziah

    Published 2024
    “…The methodology details, including parameter considerations and algorithmic processes, are outlined. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Application of Hybrid Evolutionary Algorithm and thematic map for rule set generation and visualization of chlorophyta abundance at Putrajaya lake / Lau Chia Fong by Lau, Chia Fong

    Published 2013
    “…This study describes application of a hybrid combination of hybrid evolutionary algorithm (HEA) and thematic map visualization technique in modeling, predicting and visualization of selected algae division growth, Chlorophyta for tropical Putrajaya Lakes and Wetlands (Malaysia). …”
    Get full text
    Get full text
    Thesis
  12. 12

    A Multidimensional Search Space Using Interactive Genetic Algorithm by Farooq, H., Zakaria, M.N., Hassan, M.F., Sulaiman, Suziah

    Published 2010
    “…This paper applied an Interactive Genetic Algorithm (IGA) technique to design an visualization environment for search space. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Visual analysis to investigate the capability of ANFIS in modelling hydrological relationship using synthetic dataset by Ngahzaifa, Ab. Ghani, Zuriani, Mustaffa, Zafril Rizal, M Azmi

    Published 2018
    “…In using most of the machine learning algorithms including ANFIS, to obtain the best model, the common and normal approach is always by comparing models of different parameter settings based on the goodness-offit statistical measures. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  15. 15

    Implementation of RIO in UMJaNetSim / Chan Chin We by Chan, Chin We

    Published 2004
    “…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
    Get full text
    Get full text
    Thesis
  16. 16

    Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions by Ahmed, Mashuk, Nasser, Abdullah B., Kamal Z., Zamli, Heripracoyo, Sulistyo

    Published 2022
    “…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Exploration of COVID‑19 data in Malaysia through mapper graph by Carey Ling, Yu Fan, Piau, Phang, Liew, Siaw Hong, Vivek Jason, Jayaraj, Benchawan, Wiwatanapataphee

    Published 2024
    “…To keep with the expanding quantity and complexity of data while employing minimal assumptions, a topological data analysis tool known as the Mapper algorithm is used to explore Malaysia’s daily confirmed cases, deaths, and vaccination data from the onset of the pandemic to June 2022 via data visualization and clustering. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Challenges in multi-layer data security for video steganography by Samar Kamil, Masri Ayob, Siti Norul Huda Sheikh Abdullah, Zulkifli Ahmad

    Published 2018
    “…On the other side, the hybridization of the algorithms, increase memory complexity and increase computation time for data embedding. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Investigation Of Edge Detection Techniques Based On Brain Tumor Images by Rosnan, Murni Nur Athirah

    Published 2018
    “…However, from visual perspective, Sobel operator produced better edge maps of the brain tumor compared to the Modified Canny algorithm.…”
    Get full text
    Get full text
    Monograph