Search Results - (( variable generation based algorithm ) OR ( data visualisation using algorithm ))
Search alternatives:
- variable generation »
- visualisation using »
- data visualisation »
- generation based »
- using algorithm »
-
1
Multi-dimensional Data Visualisation using Mobile Augmented Reality
Published 2020“…Therefore, this algorithm uses AR to provide a multi-display solution for improved data visualisation after processing, summarising and classifying data. …”
Get full text
Get full text
Get full text
Article -
2
Effectiveness of silhouette rendering algorithms in terrain visualisation
Published 2002“…Silhouette Rendering Algorithms have been successfully used in various applications such as communicating shape and cartoon rendering.This paper explores how effective silhouette rendering algorithms could be used in terrain visualisation. …”
Get full text
Get full text
Conference or Workshop Item -
3
Visualisation System of COVID-19 Data in Malaysia
Published 2021“…This study aims to provide a system, using COVID-19 data as a sample to visualise and analyse cases, deaths, discharged ICU cases updates in Malaysia as a whole state wise of COVID-19 daily statistics. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
3D terrain visualisation for GIS: A comparison of different techniques
Published 2011“…The results of this paper will be of help to the users in identifying the best technique of terrain visualisation suitable for GIS data.…”
Get full text
Get full text
Book Section -
5
Visualisation System of COVID-19 Data in Malaysia
Published 2021“…This study aims to provide a system, using COVID-19 data as a sample to visualise and analyse cases, deaths, discharged ICU cases updates in Malaysia as a whole state wise of COVID-19 daily statistics. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
A COMPARISON STUDY OF DATA CLUSTERING AND VISUALISATION TECHNIQUES WITH VARIOUS DATA TYPES
Published 2020“…Clustering is used to identify the intrinsic grouping of a set of unlabelled data. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
7
Adapting the Elitism on the Greedy Algorithm for Variable Strength Combinatorial Test Cases Generation
Published 2018“…This study presented the most recent variable interaction strength (VS) CT strategy using an enhanced variant in the greedy algorithm. …”
Get full text
Get full text
Get full text
Article -
8
Message based random variable length key encryption algorithm.
Published 2009“…In order to overcome analysis mentioned above a new algorithm is designed that is based on random numbers and also can defeat time and memory constraints. …”
Get full text
Get full text
Article -
9
Adopting A Particle Swarm-Based Test Generator Strategy For Variable-Strength And T-Way Testing
Published 2011“…This thesis presents the design and implementation of a new interaction test generation strategy, known as the Particle Swarm-based Test Generator (PSTG), for generating t-way and variable-strength test suites. …”
Get full text
Get full text
Thesis -
10
A case study : 2D Vs 3D parallel differential equation toward tumor cell detection on multi-core parallel computing atmosphere
Published 2010“…In order to detect tumour cells, 2D and 3D Partial Differential Equations (PDE) are considered and compared by using Multi-Core parallel computing atmosphere with visualisation, communication and data analysis. …”
Get full text
Get full text
Get full text
Article -
11
A variable combinatorial test suite strategy based on modified greedy algorithm
Published 2015“…This proposed will suggest a new CIT strategy based on a modified greedy algorithm (MGA) with addressing the supporting of variable strength interaction to generate a satisfactory test suite size.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
A firefly algorithm based hybrid method for structural topology optimization
Published 2020“…In this paper, a firefly algorithm based hybrid algorithm through retaining global convergence of firefly algorithm and ability to generate connected topologies of optimality criteria (OC) method is proposed as an alternative method to solve stress-based topology optimization problems. …”
Get full text
Get full text
Article -
13
Optimization of hydropower reservoir operation based on hedging policy using Jaya algorithm
Published 2023Article -
14
Dynamic modeling by usage data for personalization systems
Published 2009Get full text
Get full text
Conference or Workshop Item -
15
PREDICTION OF HFMD DISEASE OUTBREAK FROM TWITTER
Published 2019“…This is because both Naive Bayes and SVM are baseline algorithm used in text classification. In the end, a visualisation of HFMD Disease Map is presented to visualize the city that suffer HFMD outbreak using geo-located tweet that related with HFMD. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
16
An experimental study of neighbourhood based metaheuristic algorithms for test case generation satisfying the modified condition / decision coverage criterion
Published 2018“…To generate test cases that satisfy MC/DC criterion, many researchers adopt neighborhood based meta-heuristics algorithms (including that of Simulated Annealing and Hill Climbing) as the problem itself is neighborhood based. …”
Get full text
Get full text
Thesis -
17
-
18
Maximizing power generation in variable speed micro-hydro with power point tracking
Published 2022“…As such, this paper aims to explore and develop a feasible maximum power point tracker (MPPT) with perturb and observe (P&O) and genetic algorithm (GA) in providing optimal power generation for variable speed micro-hydro system. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
19
A new variable strength t-way strategy based on the cuckoo search algorithm
Published 2019“…Despite much progress, existing strategies have not sufficiently dealt with more than one interaction between input parameters (termed variable strength tway). Complementing existing works, this paper proposes a new variable strength cuckoo search algorithm, called VCS. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Secured agriculture sensor data based on end-to-end encryption using raspberry pi
Published 2025“…This project addresses these security concerns by developing a secure data collection and visualisation system using Raspberry Pi and Node-RED. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
