Search Results - (( based evaluation based algorithm ) OR ( visual information sharing algorithm ))

Refine Results
  1. 1
  2. 2

    Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli by Dzulkifli, Muhammad Zulhilmie

    Published 2021
    “…The main goal of this study is to create an online food ordering app using the corresponding Boyer-Moore string matching algorithm. The application evaluation process is carried out by the developer's functionality test to ensure that there are no unnecessary issues in this app, especially in the main feature. …”
    Get full text
    Get full text
    Thesis
  3. 3

    An enhanced sequential exception technique for semantic-based text anomaly detection by Taiye, Mohammed Ahmed

    Published 2019
    “…Practically, this study contributes to topic modelling and concept coherence for the purpose of visualizing information, knowledge sharing and optimized decision making.…”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    3D imaging techniques in documentation of cultural assets in Malaysia by Md. Sharif, Harlina, Hazumi, Hazman, Saedin, Nurfarhanah

    Published 2015
    “…There is very little progress towards exploring new methods or advanced technologies to convert 3D cultural assets into 3D visual representation and visualization models that are easily accessible for information sharing. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    3D documenatation of the petalaindera: Digital heritage preservation methods using 3D laser scanner and photogrammetry by Md Sharif, Harlina, Hazumi, Hazman, Meli, Rafiq Hafizuddin

    Published 2018
    “…There is very little progress towards exploring new methods or advanced technologies to convert 3D cultural assets into 3D visual representation and visualization models that are easily accessible for information sharing. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6

    3D documentation of the Petalaindera: digital heritage preservation methods using 3D laser scanner and photogrammetry by Md. Sharif, Harlina, Hazumi, Hazman, Meli, Rafiq Hafizuddin

    Published 2017
    “…There is very little progress towards exploring new methods or advanced technologies to convert 3D cultural assets into 3D visual representation and visualization models that are easily accessible for information sharing. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  7. 7

    3D documenatation of the petalaindera: Digital heritage preservation methods using 3D laser scanner and photogrammetry by Md. Sharif, Harlina, Hazumi, Hazman, Meli, Rafiq Hafizuddin

    Published 2018
    “…There is very little progress towards exploring new methods or advanced technologies to convert 3D cultural assets into 3D visual representation and visualization models that are easily accessible for information sharing. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Restaurant review system with data visualization and text search using TF-IDF algorithm / Syazwina Abd Hamid by Abd Hamid, Syazwina

    Published 2020
    “…Hence, this project focuses on the integration of information retrieval with data visualization in order to produce valuable insights. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh by Mohammed Saleh, Mohammed Ahmed

    Published 2016
    “…In the first and second methods, the visual video information is secured by encrypting limited transformed coefficients using AES algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Event feedback analytic and visualization through Twitter social platform / Muhammad Faiz Sharan by Sharan, Muhammad Faiz

    Published 2020
    “…The feedback then will be analyzed and visualized in both real-time and historical manner. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Secured electrocardiograph (ECG) signal using fully homomorphic encryption technique by Shaikh, Muhammad Umair, Ahmad, Siti Anom, Wan Adnan, Wan Azizun

    Published 2020
    “…This proposed study describes the steps of digital signal processing on electrocardiogram (ECG) and the security of the ECG signal by using Fully Homomorphic Encryption (FHE). Sharing the patient’s information through the Internet of Thing (IoT) for faster diagnosis has security and privacy issues. …”
    Get full text
    Get full text
    Article
  12. 12

    Sudoku Generator based on hybrid algorithm / Faridah Abdul Rahman by Abdul Rahman, Faridah

    Published 2012
    “…After testing and evaluation the prototype, the result shows that the Sudoku generator based on hybrid algorithm takes more times on solving the Sudoku. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Efficient genetic partitioning-around-medoid algorithm for clustering by Garib, Sarmad Makki Mohammed

    Published 2019
    “…However, the complexity of the kmedoid based algorithms in general is more than the complexity of the k-means based algorithms. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Centre-based hard clustering algorithms for Y-STR data / Ali Seman, Zainab Abu Bakar and Azizian Mohd. Sapawi by Seman, Ali, Abu Bakar, Zainab, Mohd. Sapawi, Azizian

    Published 2010
    “…The k-Means and the k-Modes algorithms are the fundamental algorithms for the centroid-based partitioning technique, whereas the k-Medoids is a representative object-based partitioning technique. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Performance Evaluation of Vector Evaluated Gravitational Search Algorithms Based on ZDT Test Functions by Badaruddin, Muhammad, Zuwairie, Ibrahim, Kamarul Hawari, Ghazali, Mohd Riduwan, Ghazali, Kian, Sheng Lim, Sophan Wahyudi, Nawawi, Nor Azlina, Ab. Aziz, Marizan, Mubin, Norrima, Mokhtar

    Published 2014
    “…This paper presents a performance evaluation of Vector Evaluated Gravitational Search Algorithm (VEGSA), namely VEGSA-I and VEGSA-II algorithms, for multi-objective optimization problems. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Human action recognition using slow feature analysis / Bardia Yousefi by Bardia, Yousefi

    Published 2016
    “…The cross-connection of the two pathways is implied throughout the present research via direct consideration, such as shared sketch algorithm and optical flow information, fuzzy max-product involvement, and scoring among each other. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Standardizing and weighting the evaluation criteria of many-objective optimization competition algorithms based on fuzzy delphi and fuzzy-weighted zero-inconsistency methods by Salih, Rawia Tahrir

    Published 2021
    “…The evaluation criteria of Many Objective Optimization algorithm (MaOO) play a critical role in evaluating the competition MaOO algorithms. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Case Slicing Technique for Feature Selection by A. Shiba, Omar A.

    Published 2004
    “…This technique with k = 10 has been used in this thesis to evaluate the proposed approach. CST was compared to other selected classification methods based on feature subset selection such as Induction of Decision Tree Algorithm (ID3), Base Learning Algorithm K-Nearest Nighbour Algorithm (k-NN) and NaYve Bay~sA lgorithm (NB). …”
    Get full text
    Get full text
    Thesis
  20. 20

    Multi-base number representation in application to scalar multiplication and pairing computation by Mohammed Ismail, Abdelwahed

    Published 2011
    “…Multi-bases number representation is used to construct new versions of Miller’s algorithm. …”
    Get full text
    Get full text
    Thesis