Search Results - (( program wave optimization algorithm ) OR ( java effective visualization algorithm ))

  • Showing 1 - 6 results of 6
Refine Results
  1. 1

    Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin by Nasaruddin, Amir Hambaly

    Published 2019
    “…The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Dynamic force-directed graph with weighted nodes for scholar network visualization by Mohd. Aris, Khalid Al-Walid, Ramasamy, Chitra, Mohd Aris, Teh Noranis, Zolkepli, Maslina

    Published 2022
    “…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
    Get full text
    Get full text
    Article
  3. 3

    Combined Effect Of Incidence - Forebody Angles on the Flow Structure Inside Spiked Supersonic Intakes by Al-Kayiem, Hussain H., Salih, T. W.

    Published 2008
    “…In house program is built to solve the governing sets of equations by using SIMPLE algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Development of wwm system using mlnn-ga for ph prediction of water quality in catchment area by Muhammad Aznil, Ab Aziz

    Published 2021
    “…MLNN-GA contain three hidden layers and Genetic Algorithm (GA) will optimize the weight of neural network during the training process. …”
    Get full text
    Get full text
    Thesis
  5. 5

    VHF adaptive antenna using a rear defogger by Abdullah, Noorsaliza

    Published 2012
    “…This algorithm is maximized the correlation coefficients. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. The first and second proposed methods were incorporated into the proposed Background Pass-Go (BPG) system and Visual Identification Protocol Professional (VIP Pro) system respectively. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis