Search Results - (( data implication from algorithm ) OR ( data visualization path algorithm ))

Refine Results
  1. 1

    Investigating and developing the best method in shortest path for implementing a geographical information system (e-map) for Peninsular Malaysia by Ahmad, Ab. Rahman, Zenon , Nasaruddin, Hassan, Haswadi

    Published 2005
    “…There are many algorithms have been designed to find these paths. The algorithms such as Djikstra, Bellman-Ford or Floyd- Warshall are difference from one to another due to the simplicity, effectiveness and duration of processing the nodes. …”
    Get full text
    Get full text
    Monograph
  2. 2

    A Study of Visual Attention in Diagnosing Cerebellar Tumours by Kuryati, Kipli, Kasumawati, Lias, Dayang Azra, Awang Mat, Othman, A.K., Ade Syaheda Wani, Marzuki, Zamhari, N.

    Published 2009
    “…In particular, the eye-tracking data revealed which aspects of the spectrogram received more visual attention and in what order they were viewed. …”
    Get full text
    Get full text
    Article
  3. 3

    Development of Path Loss Models for Smooth and Convex Surfaces Terrains in Malaysian Environment by Wong, Peng Kiong

    Published 2004
    “…A computer program was developed to acquire measured field strength data from the spectrum analyzer and convert the values to path loss using Agilent Visual Engineering Environment (VEE). …”
    Get full text
    Get full text
    Thesis
  4. 4

    A Development Of An Internet Of Things Equipped Unmanned Ground Vehicle For Surveilance Purpose by Azizan, Anis Natasha

    Published 2019
    “…The data stored in the cloud can be retrieved and processed using ThingSpeak software as this software allow user to aggregate, visualize, and analyze live data streams in the cloud. …”
    Get full text
    Get full text
    Monograph
  5. 5
  6. 6

    Development of obstable avoidance system for 3D robot navigation by Er, Kai Sheng

    Published 2024
    “…Rviz2 was utilized for visualizing coordinate frames. The algorithm was tested in both simulation and on the physical robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    The evolution and trend of chain code scheme by Wulandhari, Lily Ayu, Haron, Habibollah

    Published 2008
    “…This paper explains some chain code concepts and their applications that are be the background of the development of vertex chain code cells algorithm. This algorithm is able to visualize and to transcribe a binary image into vertex chain code easily. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Courier delivery services visualisor (CDSV) with an integration of genetic algorithm and A* engine by Jalaluddin, Mohammad Fariduddin, Kamaru-Zaman, Ezzatul Akmal, Abdul Rahman, Shuzlina, Mutalib, Sofianita

    Published 2017
    “…This study developed Courier Delivery Services Visualisor (CDSV) that is able to visualize the best route to be taken by distributor, so that the courier service can arrive on time.CDSV employed Genetic Algorithm (GA) and Astar Algorithm (A*) that integrates with Geographical Information System (GIS) data.A graphical user interface in the form of simulation map that suggests the best route and the optimal distance are displayed for easier courier service distribution references.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Using artificial intelligence search in solving the camera placement problem by Altahir, A.A., Asirvadam, V.S., Hamid, N.H.B., Sebastian, P.

    Published 2022
    “…The computation of the coverage table offers essential data to formulate the search space. Furthermore, in order to locate the solution to the problem, each search strategy defines a unique path throughout the search space. …”
    Get full text
    Get full text
    Book
  10. 10
  11. 11

    Application Of Bibliometric Analysis on Root Growth Algorithm by Tengku Malim Busu, Tengku Nurul Aimi Balqis, Ahmad Kamaruddin, Saadi, Ahad, Nor Aishah, Md Ghani, Nor Azura, Hamid, Hashibah

    Published 2024
    “…An article reviewed and analyzed bibliographic data on metaheuristics but is not specific on the topic of root growth algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Malware Classification and Detection using Variations of Machine Learning Algorithm Models by Andi Maslan, Andi Maslan, Abdul Hamid, Abdul Hamid

    Published 2025
    “…Types of attacks can be Ping of Death, flooding, remote-controlled attacks, UDP flooding, and Smurf Attacks. Attack data was obtained from the ClaMP dataset, which has an unbalanced data set, and has very high noise, so it is necessary to analyze data packets in network logs and optimize feature extraction which is then analyzed statistically with machine learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Algoritma pendaraban nombor perpuluhan dari perspektif pelajar Tingkatan Satu by Md. Yunus, Aida Suraya

    Published 2001
    “…This study discusses the algorithms in multiplication involving decimal numbers from the perspectives of Form One students. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Algorithms for moderating effect of emotional value from a cross-media data fusion perspective: a case study of Chinese dating reality shows by Zhang, Shasha, Dong, Qiming, Yasin, Megat Al Imran, Fang, Ng Chwee

    Published 2026
    “…Preprocessing removes noise from text data, normalizes sentiment word lists and undertakes temporal transformation. …”
    Get full text
    Get full text
    Article
  16. 16

    A Method for Mapping XML DTD to Relational Schemas In The Presence Of Functional Dependencies by Ahmad, Kamsuriah

    Published 2008
    “…To approach the mapping problem, three different components are explored: the mapping algorithm, functional dependency for XML, and implication process. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Age detection from face using Convolutional Neural Network (CNN) / Hanin Hanisah Usok @ Yusoff by Usok @ Yusoff, Hanin Hanisah

    Published 2024
    “…Following a thorough examination of numerous algorithms, CNN was determined to be the best effective method for age recognition from facial features due to its ability to automatically extract important data. …”
    Get full text
    Get full text
    Thesis
  19. 19

    A comparative study of COVID-19 CT image synthesis using GAN and CycleGAN by Kin Wai Lee, Renee Ka Yin Chin

    Published 2022
    “…Generative adversarial networks (GANs) have been very successful in many applications of medical image synthesis, which hold great clinical value in diagnosis and analysis tasks, especially when data is scarce. This study compares the two most adopted generative modelling algorithms in recent medical image synthesis tasks, namely the traditional Generative Adversarial Network (GAN) and Cycleconsistency Generative Adversarial Network (CycleGAN) for COVID-19 CT image synthesis. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  20. 20

    Development Of Distributed Grid-Based Hydrological Model And Floodplain Inundation Management System by Al_Fugara, A’kif Mohammed Salem

    Published 2008
    “…It has been found that the modeled predictions of depth and discharge matched observed data. A good agreement between the simulated and observed data was achieved for rating curves with RMSE = 0.96, 0.94, 0.95, and 0.97 at respective calibration points. …”
    Get full text
    Get full text
    Thesis