Search Results - (( variable visualization using algorithm ) OR ( java data prevention algorithm ))

Refine Results
  1. 1

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Application of Hybrid Evolutionary Algorithm and thematic map for rule set generation and visualization of chlorophyta abundance at Putrajaya lake / Lau Chia Fong by Lau, Chia Fong

    Published 2013
    “…This study describes application of a hybrid combination of hybrid evolutionary algorithm (HEA) and thematic map visualization technique in modeling, predicting and visualization of selected algae division growth, Chlorophyta for tropical Putrajaya Lakes and Wetlands (Malaysia). …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    ENGINEERING DESIGN WITH PSO ALGORITHM by MHD BASIR, SITI NUR HAJAR

    Published 2019
    “…It assists design engineers as it gives a clearer visualization to predict which value of the variables gives a best produced result. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…Obfuscation (Obfu) is a practice to make the programming code complicated to protect the Intellectual Property (IP) and prevent prohibited software Reverse Engineering (RE). …”
    Get full text
    Get full text
    Thesis
  6. 6

    Coronary artery stenosis detection and visualization / Tang Sze Ling by Tang, Sze Ling

    Published 2015
    “…Particularly, this thesis aims to (1) minimize the interaction level of the computer-aided procedure, (2) visualize the arteries without obstruction and (3) detect the stenosis with consistent observation using the computer-aided procedure. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Survival versus non-survival prediction after acute coronary syndrome in Malaysian population using machine learning technique / Nanyonga Aziida by Nanyonga , Aziida

    Published 2019
    “…Prediction, identification, understanding and visualization of relationship between factors affecting mortality in ACS patients using feature selection and ML algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    KNN Algorithm to Determine Optimum Agricultural Commodities in Smart Farming by Cucus, Ahmad, Al Fahim, Mubarak Ali, Afrig, Aminuddin, Pristyanto, Yoga, Abdulloh, Ferian Fauzi, Zafril Rizal, M. Azmi

    Published 2023
    “…The algorithm used in this research is KNN, which was chosen because the variable has a numeric data type to perform the matching. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Automatic control of flotation process using computer vision by Saravani, Ali Jahed

    Published 2015
    “…A froth model correlating the image variables to process variables and a prediction system estimating the metallurgical parameters based on image variables were then developed by using a neural network structure. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Damage visualization based on frequency shift of single-mode ultrasound-guided wavefield by Shahrim, Muhamad Azim, Harmin, Mohammad Yazdi, Romli, Fairuz Izzuddin, Chia, Chen Ciang, Jung-Ryul, Lee

    Published 2022
    “…Last but not least, the comparison of accuracy between frequency analysis algorithm and variable time window amplitude mapping (VTWAM) algorithm is performed. …”
    Get full text
    Get full text
    Article
  11. 11

    Development Of Machine Learning User Interface For Pump Diagnostics by Lee, Zhao Yang

    Published 2022
    “…Machine Learning is one of the ways as a preventive method by applying the data collected from the clogging experiment in the vibration lab to build up a machine learning model for classification of flow blockage levels in the centrifugal pump. …”
    Get full text
    Get full text
    Monograph
  12. 12

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…It is a code with double shield protection that prevents unauthorized extraction or damaging the remote database in the server side due to malicious SQL injection. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Extremal region detection and selection with fuzzy encoding for food recognition by Razali @ Ghazali, Mohd Norhisham

    Published 2019
    “…The first algorithm locates interest points in food images using an MSER. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Musical instrument identification using Convolutional Neural Network (CNN) algorithm / Muhammad Nur Azri Irfan Abdul Rahman by Abdul Rahman, Muhammad Nur Azri Irfan

    Published 2025
    “…This approach tried to overcome the limitations of the manual method and traditional algorithm, which tends to fail with the diverse dataset, diverse visual features, and scalability. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Human activity recognition via accelerometer and gyro sensors by Tee, Jia Lin

    Published 2023
    “…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16
  17. 17
  18. 18

    The Implementation of Genetic Algorithm in Path Optimization by Jumali, Suriana

    Published 2005
    “…In this project, TSP will be used to model and easy visualize the path optimization problem and Genetic Algorithm (GA) was chosen to be implemented in resolving the problem. …”
    Get full text
    Get full text
    Final Year Project
  19. 19

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    3D surface roughness measurement for scaliness scoring of psoriasis lesions by Ahmad Fadzil, M.H., Prakasa, E., Asirvadam, V.S., Nugroho, H., Affandi, A.M., Hussein, S.H.

    Published 2013
    “…Dermatologists typically use visual and tactile senses in PASI scaliness assessment. …”
    Get full text
    Get full text
    Article