Search Results - (( visualization implementation tree algorithm ) OR ( java implementation new algorithm ))
Search alternatives:
- visualization implementation »
- implementation tree »
- java implementation »
- implementation new »
- tree algorithm »
- new algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Fast clock tree generation using exact zero skew clock routing algorithm
Published 2009“…A few Perl scripts and a new visual basic based routing tool have been developed to support the methodology implementation. …”
Get full text
Get full text
Get full text
Article -
3
Zero skew clock routing for fast clock tree generation
Published 2008“…A few Perl scripts and a new Visual Basic based routing tool have been developed to support the methodology implementation. …”
Get full text
Get full text
Get full text
Proceeding Paper -
4
The comparison of interactive 3D visualization between static and animated approaches for learning binary tree topic / Mohd Zulhisam Yaakub
Published 2016“…This shows that both 3D visualization methods implemented in this study can increase the student learning achievements and spatial abilities. …”
Get full text
Get full text
Thesis -
5
Comparison Of Phylogenetic Trees Using Difference Distance Function Method
Published 2005“…The pre-processing is implemented using the Microsoft Visual C++. The phylogenetic tree is build using the PHYLlP (the PHYlogeny Inference Package), a package of programs for inferring phylogenies (evolutionary trees). …”
Get full text
Get full text
Final Year Project Report / IMRAD -
6
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Car dealership web application
Published 2022“…Tree SHAP, which was implemented by third-party SHAP Python library, were used in model monitoring and made the models interpretable. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
Review -
9
Fitness value based evolution algorithm approach for text steganalysis model
Published 2013“…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
Get full text
Get full text
Article -
10
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
11
Edge assisted crime prediction and evaluation framework for machine learning algorithms
Published 2022“…The complete study and implementation process have shown a visual representation of crime in various areas of country. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Using modification of Prim's algorithm and GNU Octave and to solve the multiperiods installation problem
Published 2020“…, and that name is chosen because it is like Unix but differs from Unix because it is free and contains no Unix code. Those algorithms were implemented using 300 randomly generated problems. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
13
Biometrics electronic purse
Published 1999“…This paper looked into using biometrics as a mean of authentication, thus requiring a new generation of Smart Card technology to be implemented in banking and multiple applications environment. …”
Get full text
Get full text
Get full text
Proceeding Paper -
14
Analysis of hyperspectral reflectance for disease classification of soybean frogeye leaf spot using Knime analytics
Published 2023“…This analysis involved the implementation of machine learning (ML) algorithms, including decision trees, random forests, and stacking, to classify soybean FLS severity levels. …”
Get full text
Get full text
Article -
15
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…The proposed algorithms (Priority Dynamic Quantum Time and Multi Priority Dynamic Quantum Time Algorithms) are implemented using JAVA programming language and validated using Key Performance Indicators equations. …”
Get full text
Get full text
Thesis -
16
Face recognition and identification system (FaceRec) / Khew Jye Huei
Published 2004“…It describes the implementation and functions of a working system that performs the recognition and identification of human faces using the implement algorithms. …”
Get full text
Get full text
Thesis -
17
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
18
Dynamic scene occlusion culling in architectural scenes based on dynamic bounding volume
Published 2006“…This algorithm is implemented using portal occlusion culling and kD-tree, which is suitable for indoor and architectural scenes. …”
Get full text
Get full text
Thesis -
19
Enhancement of medical image compression algorithm in noisy WLANS transmission
Published 2018“…For image reconstruction,decoding steps based the developed quantization architecture are examined.The EICA is particularly useful where the size of the transmitted data needs to be reduced to minimize the image transmission time.For data compression with suitable and effective performance,enhanced independent components analysis (EICA) is proposed as an algorithm for compression and decompression of medical data.A comparative analysis is performed based on existing data compression techniques:discrete cosine transform (DCT), set partitioning in hierarchical trees (SPIHT),and Joint Photographic Experts Group (JPEG 2000).Three main modules,namely,compression segment (CS),transceiver segment (TRS),and outcome segment (OTS) modules,are developed to realize a fully computerized simulation tool for medical data compression with suitable and effective performance.To compress medical data using algorithms,CS module involves four different approaches which are DCT, SPIHT,JPEG 2000 and EICA.TRS module is processed by low-cost WLANs with low-bandwidth transmission.Finally,OTS is used for data decompression and visualization result.In terms of compression module,results show the benefits of applying EICA in medical data compression and transmission.While for system design,the developed system displays favorable outcomes in compressing and transmitting medical data.In conclusion,all three modules (CS,TRS,and OTS) are integrated to yield a computerized prototype named as Medical Data Simulation System(Medata-SIM) computerized system that includes medical data compression and transceiver for visualization to aid medical practitioners in carrying out rapid diagnoses.…”
Get full text
Get full text
Get full text
Thesis -
20
Analyzing visitor trends to optimize data-driven strategies in Pusat Sains & Kreativiti Terengganu
Published 2025“…To overcome these issues, historical visitor data from January 2022 to December 2024 was collected and analyzed using the CRISP-DM methodology, which guided the project through business understanding, data preparation, modelling, and deployment. Three predictive algorithms including Decision Tree (DT), Random Forest (RF), and Naive Bayes (NB) were tested to classify visitor levels into low, medium, and high categories. …”
Get full text
Get full text
Student Project
