Search Results - (( data application need algorithm ) OR ( data visualization using algorithm ))
Search alternatives:
- data visualization »
- data application »
- application need »
- using algorithm »
- need algorithm »
-
1
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
2
Text Extraction Algorithm for Web Text Classification
Published 2010“…A text extraction prototype is built using Visual C# 2008 to validate the algorithm. It is a windows application mixed with web connection protocol. …”
Get full text
Get full text
Get full text
Thesis -
3
Enhanced 3D terrain visualization process using game engine
Published 2018“…Furthermore, operating system resource needs to be used before it goes online. The main finding of this study is the new algorithm of enhancing 3D terrain visualization process using Unity3D game engine. …”
Get full text
Get full text
Get full text
Thesis -
4
DATA CLASSIFICATION SYSTEM WITH FUZZY NEURAL BASED APPROACH
Published 2005“…Knowledge Discovery in Database and Data Mining use techniques derived from machine learning, visualization and statistics to investigate real world data. …”
Get full text
Get full text
Final Year Project -
5
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006“…Computer A will be sent the data to computer B through the internet/LAN using JAVA program. …”
Get full text
Get full text
Monograph -
6
SENSORY EXPERT: DEVICE FOR SENSORY TEST
Published 2018“…In developing the algorithm for heat sensing, humidity and temperature sensor DHT 11 is used and the data of temperature is displayed in Blynk applications. …”
Get full text
Get full text
Final Year Project -
7
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
Get full text
Get full text
Thesis -
8
Determining the graduates employability using data analytics model
Published 2023“…These studies used a data analytics model to forecast the employability of graduates using the linear regression algorithm and the SMOreg algorithm, predict the number of graduates in the next 3 years in the BS Information Technology program, and determine the percentage of graduates who are employed and unemployed using the data sourced from the tracer study conducted. …”
Get full text
Get full text
Get full text
Article -
9
Application Of Bibliometric Analysis on Root Growth Algorithm
Published 2024“…The root growth algorithm has often been used to solve challenging optimization issues. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Comparative Performance Analysis of Bat Algorithm and Bacterial Foraging Optimization Algorithm using Standard Benchmark Functions
Published 2014“…Owing to the fact that they are new and much of their relative performance are still unknown (as compared to other established meta-heuristic algorithms), Bacterial Foraging Optimization Algorithm (BFO) and Bat Algorithm (BA) have been adopted for comparison using the 12 selected benchmark functions. …”
Get full text
Get full text
Conference or Workshop Item -
11
Image steganography using web application / Nor Arzami Othman ... [et al.]
Published 2023“…The application utilizes an advanced steganographic algorithm, which is Randomized Least Significant Bit (RLSB), to ensure robust data concealment while maintaining the visual integrity of the cover image. …”
Get full text
Get full text
Get full text
Article -
12
Development of a Spatiotemporal Data Model for Management and Visualization of Surface Movement Data
Published 2008“…In developing the visualization tool, visualization algorithm was used by employing the morphing technique which uses parametric equation. …”
Get full text
Get full text
Thesis -
13
Investigation Of Edge Detection Techniques Based On Brain Tumor Images
Published 2018“…The visual results from each operators are analyzed using quantitative and qualitative measurement. …”
Get full text
Get full text
Monograph -
14
Development of Technical Safety Dashboard Using Microsoft Power BI Integration with R
Published 2020“…This algorithm has been used to forecast on the end date of projects. …”
Get full text
Get full text
Final Year Project -
15
Single-Trial Subspace-Based Approach for VEP Extraction
Published 2010“…With the simulated data, the algorithms are used to estimate the latencies of P100, P200, and P300 of VEP signals corrupted by additive colored noise at different values of SNR. …”
Get full text
Get full text
Get full text
Article -
16
Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli
Published 2021“…The main goal of this study is to create an online food ordering app using the corresponding Boyer-Moore string matching algorithm. The application evaluation process is carried out by the developer's functionality test to ensure that there are no unnecessary issues in this app, especially in the main feature. …”
Get full text
Get full text
Thesis -
17
Adaptive algorithms for automated intruder detection in surveillance networks
Published 2014“…Two of the proposed algorithms have been developed by us. With application to two complementary data sets and quantitative performance comparisons with two representative existing schemes, we show that it is possible to easily obtain high detection accuracy with low false positives.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
Gun detection system using Yolov3
Published 2019“…The objective of this paper is to visually detect the handgun in real time videos. The proposed method is using YOLO-V3 algorithm and comparing the number of false positive and false negative with Faster RCNN algorithm. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
Ciphercrypt-an Encryption System / Nor Hidayah Ngah
Published 2004“…The hashed keyword will be used in encrypt / decrypt process by using any of 3 encryption algorithm mentioned before. …”
Get full text
Get full text
Thesis -
20
Extract Motion from Picture Sequence
Published 2008“…The algorithm is used as reference to create a coding input for the MATLAB, which is the software used in this project. …”
Get full text
Get full text
Final Year Project
