Search Results - (( based evaluation based algorithm ) OR ( visual information sharing algorithm ))
Search alternatives:
- information sharing »
- visual information »
- sharing algorithm »
- based evaluation »
- evaluation based »
-
1
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
2
Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli
Published 2021“…The main goal of this study is to create an online food ordering app using the corresponding Boyer-Moore string matching algorithm. The application evaluation process is carried out by the developer's functionality test to ensure that there are no unnecessary issues in this app, especially in the main feature. …”
Get full text
Get full text
Thesis -
3
An enhanced sequential exception technique for semantic-based text anomaly detection
Published 2019“…Practically, this study contributes to topic modelling and concept coherence for the purpose of visualizing information, knowledge sharing and optimized decision making.…”
Get full text
Get full text
Get full text
Thesis -
4
3D imaging techniques in documentation of cultural assets in Malaysia
Published 2015“…There is very little progress towards exploring new methods or advanced technologies to convert 3D cultural assets into 3D visual representation and visualization models that are easily accessible for information sharing. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
3D documenatation of the petalaindera: Digital heritage preservation methods using 3D laser scanner and photogrammetry
Published 2018“…There is very little progress towards exploring new methods or advanced technologies to convert 3D cultural assets into 3D visual representation and visualization models that are easily accessible for information sharing. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
3D documentation of the Petalaindera: digital heritage preservation methods using 3D laser scanner and photogrammetry
Published 2017“…There is very little progress towards exploring new methods or advanced technologies to convert 3D cultural assets into 3D visual representation and visualization models that are easily accessible for information sharing. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
3D documenatation of the petalaindera: Digital heritage preservation methods using 3D laser scanner and photogrammetry
Published 2018“…There is very little progress towards exploring new methods or advanced technologies to convert 3D cultural assets into 3D visual representation and visualization models that are easily accessible for information sharing. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
8
Restaurant review system with data visualization and text search using TF-IDF algorithm / Syazwina Abd Hamid
Published 2020“…Hence, this project focuses on the integration of information retrieval with data visualization in order to produce valuable insights. …”
Get full text
Get full text
Thesis -
9
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…In the first and second methods, the visual video information is secured by encrypting limited transformed coefficients using AES algorithm. …”
Get full text
Get full text
Thesis -
10
Event feedback analytic and visualization through Twitter social platform / Muhammad Faiz Sharan
Published 2020“…The feedback then will be analyzed and visualized in both real-time and historical manner. …”
Get full text
Get full text
Thesis -
11
Secured electrocardiograph (ECG) signal using fully homomorphic encryption technique
Published 2020“…This proposed study describes the steps of digital signal processing on electrocardiogram (ECG) and the security of the ECG signal by using Fully Homomorphic Encryption (FHE). Sharing the patient’s information through the Internet of Thing (IoT) for faster diagnosis has security and privacy issues. …”
Get full text
Get full text
Article -
12
Sudoku Generator based on hybrid algorithm / Faridah Abdul Rahman
Published 2012“…After testing and evaluation the prototype, the result shows that the Sudoku generator based on hybrid algorithm takes more times on solving the Sudoku. …”
Get full text
Get full text
Thesis -
13
Efficient genetic partitioning-around-medoid algorithm for clustering
Published 2019“…However, the complexity of the kmedoid based algorithms in general is more than the complexity of the k-means based algorithms. …”
Get full text
Get full text
Thesis -
14
Centre-based hard clustering algorithms for Y-STR data / Ali Seman, Zainab Abu Bakar and Azizian Mohd. Sapawi
Published 2010“…The k-Means and the k-Modes algorithms are the fundamental algorithms for the centroid-based partitioning technique, whereas the k-Medoids is a representative object-based partitioning technique. …”
Get full text
Get full text
Get full text
Article -
15
Performance Evaluation of Vector Evaluated Gravitational Search Algorithms Based on ZDT Test Functions
Published 2014“…This paper presents a performance evaluation of Vector Evaluated Gravitational Search Algorithm (VEGSA), namely VEGSA-I and VEGSA-II algorithms, for multi-objective optimization problems. …”
Get full text
Get full text
Get full text
Article -
16
Evaluation of Vector Evaluated Particle Swarm Optimisation Enhanced with Non-dominated Solutions and Multiple Nondominated Leaders based on WFG Test Functions
Published 2014“…The improved VEPSO algorithms have been subjected to a series of numerical experiments based on ZDT benchmark datasets. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Human action recognition using slow feature analysis / Bardia Yousefi
Published 2016“…The cross-connection of the two pathways is implied throughout the present research via direct consideration, such as shared sketch algorithm and optical flow information, fuzzy max-product involvement, and scoring among each other. …”
Get full text
Get full text
Thesis -
18
Standardizing and weighting the evaluation criteria of many-objective optimization competition algorithms based on fuzzy delphi and fuzzy-weighted zero-inconsistency methods
Published 2021“…The evaluation criteria of Many Objective Optimization algorithm (MaOO) play a critical role in evaluating the competition MaOO algorithms. …”
Get full text
Get full text
Thesis -
19
Case Slicing Technique for Feature Selection
Published 2004“…This technique with k = 10 has been used in this thesis to evaluate the proposed approach. CST was compared to other selected classification methods based on feature subset selection such as Induction of Decision Tree Algorithm (ID3), Base Learning Algorithm K-Nearest Nighbour Algorithm (k-NN) and NaYve Bay~sA lgorithm (NB). …”
Get full text
Get full text
Thesis -
20
Multi-base number representation in application to scalar multiplication and pairing computation
Published 2011“…Multi-bases number representation is used to construct new versions of Miller’s algorithm. …”
Get full text
Get full text
Thesis
