Search Results - (( variable rendering optimization algorithm ) OR ( java effective visualization algorithm ))
Search alternatives:
- rendering optimization »
- variable »
- java »
-
1
Using predictive analytics to solve a newsvendor problem / S. Sarifah Radiah Shariff and Hady Hud
Published 2023“…Secondly, in solving every Machine Learning problem, there is no one algorithm superior to other algorithms. Every algorithm makes its own respective prior assumptions about the relationships between the features and target variables, which create different types and levels of bias. …”
Get full text
Get full text
Book Section -
2
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
Get full text
Get full text
Thesis -
3
Dynamic force-directed graph with weighted nodes for scholar network visualization
Published 2022“…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
Get full text
Get full text
Article -
4
DRIFT ANALYSIS ON NEURAL NETWORK MODEL OF HEAT EXCHANGER FOULING
Published 2008“…Information Criteria have been reported to be used for the selection of relevant input variables and determination of optimal NN model structures. …”
Get full text
Get full text
Get full text
Article -
5
Hybrid dynamic scheduling model for flexible manufacturing system with machine availability and new job arrivals
Published 2015“…The idea of hybridizing the newly developed biogeography based optimization algorithm (BBO) with variable neighborhood structure (VNS) is proposed in order to produce a high performance initial schedule in terms of minimum completion time, tardiness and flow time within reasonable amount of time. …”
Get full text
Get full text
Thesis -
6
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. The first and second proposed methods were incorporated into the proposed Background Pass-Go (BPG) system and Visual Identification Protocol Professional (VIP Pro) system respectively. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis
