Search Results - (( _ visualization techniques algorithm ) OR ( data optimization method algorithm ))

Refine Results
  1. 1
  2. 2

    Simulation and Visualization of TSP Using Ant Colony Optimization by Tri Basuki, Kurniawan, Misinem, ., Astried, ., Joan Angelina, Widians

    Published 2023
    “…This study aims to simulate and visualize the TSP by developing a software simulation model. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Optimization of the Jakim halal logo placement on qr code using enhanced genetic algorithm by Rohani, Fuaad

    Published 2018
    “…The proposed work has been compared to GA-based technique, module modification technique and Simulated Annealing technique related to QR code readability, embedded logo visual quality and high embedded data capacity. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Using artificial intelligence search in solving the camera placement problem by Altahir, A.A., Asirvadam, V.S., Hamid, N.H.B., Sebastian, P.

    Published 2022
    “…Following the coverage modeling, an optimization method needs to be used to locate the optimal poses and/or camera positions. …”
    Get full text
    Get full text
    Book
  5. 5

    Initialization procedure in solving Optimal Power Flow (OPF) using Artificial Immune System (AIS) optimization technique / Aimi Idzwan Tajudin by Tajudin, Aimi Idzwan

    Published 2007
    “…The programmed that has been used in this project is MATLAB, which provides a high level computing language and interactive environment for algorithm development, data visualization, data analysis and numerical analysis. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A Time-Domain Subspace Technique for Estimating Visual Evoked Potential Latencies by Yusoff, Mohd Zuki, Kamel, Nidal

    Published 2010
    “…Further, GSA has been compared with a third-order correlation (TOC) method, using both realistic simulation and real patient data gathered in a hospital. …”
    Get full text
    Get full text
    Get full text
    Citation Index Journal
  7. 7

    Enhanced bibliographic data retrieval and visualization using query optimization and spectral centrality measure by Ramasamy, Chitra, Zolkepli, Maslina

    Published 2019
    “…This study will be focusing on the visualization of bibliographic data by retrieving the most influenced papers using hybrid clustering techniques and visualize it in an understandable network diagram using the weight age node. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    A genetic algorithm to minimise the maximum lateness on a single machine family scheduling problem by Lee, Lai Soon, Nazif, Habibeh

    Published 2009
    “…The OCGA is compared with other well known local search method namely dynamic length tabu search, randomised steepest descent method, and other variants of genetic algorithms using extensive data sets collected from the literatures. …”
    Get full text
    Conference or Workshop Item
  9. 9

    Evolutionary tuning of modular fuzzy controller for two-wheeled wheelchair by Ahmad, Salmiah, Siddique, Nazmul H., Tokhi, Mohammad Osman

    Published 2012
    “…A global optimization mechanism such as genetic algorithm is necessary to improve the system performance. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    An enhanced sequential exception technique for semantic-based text anomaly detection by Taiye, Mohammed Ahmed

    Published 2019
    “…This study proposes an Enhanced Sequential Exception Technique (ESET) to detect semantic-based text anomaly by achieving five objectives: (1) to modify Sequential Exception Technique (SET) in processing unstructured text; (2) to optimize Cosine Similarity for identifying similar and dissimilar text data; (3) to hybridize modified SET with Latent Semantic Analysis (LSA); (4) to integrate Lesk and Selectional Preference algorithms for disambiguating senses and identifying text canonical form; and (5) to represent semantic-based text anomaly using First Order Logic (FOL) and Concept Network Graph (CNG). …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Detection of defect in concrete using elastic wave tomography reconstruction technique / Liu Kit Fook by Liu, Kit Fook

    Published 2017
    “…Hence, detection and assessment of defects in structures have to be carried out effectively. The tomography technique is one of the NDE methods that evaluate soundness of concrete structures by providing visualization to its interior. …”
    Get full text
    Get full text
    Thesis
  12. 12

    P300 detection of brain signals using a combination of wavelet transform techniques by Motlagh, Farid Esmaeili

    Published 2012
    “…In this research the BCI competition data-set has been processed through 5 optimized detection methods. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Chemometrics analysis for the detection of dental caries via ultraviolet absorption spectroscopy / Katrul Nadia Basri by Basri, Katrul Nadia

    Published 2023
    “…Currently, dental caries has become the first ranking among the NCDs due to its high prevalence. Methods such as visual inspection by the dentist, imaging and illumination techniques have been widely used by the dentist to diagnose the patient’s severity of dental caries. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Classification of labour pain using electroencephalogram signal based on wavelet method / Sai Chong Yeh by Sai , Chong Yeh

    Published 2020
    “…The training and parameters selection of the machine learning algorithms are conducted using EEG data collected from ten subjects in the laboratory. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Edge assisted crime prediction and evaluation framework for machine learning algorithms by Adhikary, Apurba, Murad, Saydul Akbar, Munir, Md Shirajum, Choong Seon, Hong Seong

    Published 2022
    “…A maximum accuracy of 81% is obtained for Decision Tree algorithm during the prediction of crime. The findings demonstrate that employing Machine Learning techniques aids in the prediction of criminal events, which has aided in the enhancement of public security.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Customer mobile behavioral segmentation and analysis in telecom using machine learning by Sharaf Addin, Eman Hussein, Admodisastro, Novia Indriaty, Mohd Ashri, Siti Nur Syahirah, Kamaruddin, Azrina, Chew, Yew Chong

    Published 2021
    “…The study applied analytic pipeline that involved five stages i.e. data generation, data pre-processing, data clustering, clusters analysis, and data visualization. …”
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Mean of correlation method for optimization of affective states detection in children by Rusli, Nazreen, Sidek, Shahrul Na'im, Md Yusuf, Hazlina, Ishak, Nor Izzati

    Published 2018
    “…This paper proposes an effective algorithm of texture analysis based on novel technique using Gray Level Co-occurrence Matrix approach to be applied so as to identify blood-flow region. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Intelligent image noise types recognition and denoising system using deep learning / Khaw Hui Ying by Khaw , Hui Ying

    Published 2019
    “…To classify image noise type, the CNN trained with Backpropagation (BP) algorithm and Stochastic Gradient Descent (SGD) optimization technique are implemented. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain by Mehdi , Hussain

    Published 2017
    “…Finally, this research proposed hybrid embedding methods by integrating the above RMDR and PBPVD techniques to achieve the optimal steganography objectives. …”
    Get full text
    Get full text
    Get full text
    Thesis