Search Results - (( data visualization path algorithm ) OR ( java application towards algorithm ))
Search alternatives:
- data visualization »
- visualization path »
- towards algorithm »
- java application »
- path algorithm »
-
1
Investigating and developing the best method in shortest path for implementing a geographical information system (e-map) for Peninsular Malaysia
Published 2005“…There are many algorithms have been designed to find these paths. The algorithms such as Djikstra, Bellman-Ford or Floyd- Warshall are difference from one to another due to the simplicity, effectiveness and duration of processing the nodes. …”
Get full text
Get full text
Monograph -
2
A Study of Visual Attention in Diagnosing Cerebellar Tumours
Published 2009“…In particular, the eye-tracking data revealed which aspects of the spectrogram received more visual attention and in what order they were viewed. …”
Get full text
Get full text
Article -
3
Development of Path Loss Models for Smooth and Convex Surfaces Terrains in Malaysian Environment
Published 2004“…A computer program was developed to acquire measured field strength data from the spectrum analyzer and convert the values to path loss using Agilent Visual Engineering Environment (VEE). …”
Get full text
Get full text
Thesis -
4
A Development Of An Internet Of Things Equipped Unmanned Ground Vehicle For Surveilance Purpose
Published 2019“…The data stored in the cloud can be retrieved and processed using ThingSpeak software as this software allow user to aggregate, visualize, and analyze live data streams in the cloud. …”
Get full text
Get full text
Monograph -
5
A coverage path planning approach for autonomous radiation mapping with a mobile robot
Published 2023Article -
6
Network game (Literati) / Chung Mei Kuen
Published 2003“…This thesis steps towards developing a networked game, Literati game system that supporting two players at one time. …”
Get full text
Get full text
Thesis -
7
Development of obstable avoidance system for 3D robot navigation
Published 2024“…Rviz2 was utilized for visualizing coordinate frames. The algorithm was tested in both simulation and on the physical robot. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
The evolution and trend of chain code scheme
Published 2008“…This paper explains some chain code concepts and their applications that are be the background of the development of vertex chain code cells algorithm. This algorithm is able to visualize and to transcribe a binary image into vertex chain code easily. …”
Get full text
Get full text
Get full text
Article -
9
Courier delivery services visualisor (CDSV) with an integration of genetic algorithm and A* engine
Published 2017“…This study developed Courier Delivery Services Visualisor (CDSV) that is able to visualize the best route to be taken by distributor, so that the courier service can arrive on time.CDSV employed Genetic Algorithm (GA) and Astar Algorithm (A*) that integrates with Geographical Information System (GIS) data.A graphical user interface in the form of simulation map that suggests the best route and the optimal distance are displayed for easier courier service distribution references.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Automated time series forecasting
Published 2011Get full text
Get full text
Get full text
Monograph -
11
Using artificial intelligence search in solving the camera placement problem
Published 2022“…The computation of the coverage table offers essential data to formulate the search space. Furthermore, in order to locate the solution to the problem, each search strategy defines a unique path throughout the search space. …”
Get full text
Get full text
Book -
12
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
13
-
14
-
15
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
16
Network monopoly / Tan Kean Yeap
Published 2002“…With the powerful networking features of Java, it is expected that this project would produce a "real" game engine. …”
Get full text
Get full text
Thesis -
17
A comparative study of COVID-19 CT image synthesis using GAN and CycleGAN
Published 2022“…Generative adversarial networks (GANs) have been very successful in many applications of medical image synthesis, which hold great clinical value in diagnosis and analysis tasks, especially when data is scarce. This study compares the two most adopted generative modelling algorithms in recent medical image synthesis tasks, namely the traditional Generative Adversarial Network (GAN) and Cycleconsistency Generative Adversarial Network (CycleGAN) for COVID-19 CT image synthesis. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
18
Development Of Distributed Grid-Based Hydrological Model And Floodplain Inundation Management System
Published 2008“…It has been found that the modeled predictions of depth and discharge matched observed data. A good agreement between the simulated and observed data was achieved for rating curves with RMSE = 0.96, 0.94, 0.95, and 0.97 at respective calibration points. …”
Get full text
Get full text
Thesis -
19
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
