Search Results - (( based evaluation method algorithm ) OR ( data visualization study algorithm ))

Refine Results
  1. 1

    Tag clouds algorithm with the inclusion of personality traits by Ahmad Affandi, Supli

    Published 2015
    “…Therefore, the main objective of this study is to develop an algorithm that can adapt visual features of tag cloud layout styles based on personality traits of the user. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4

    A review on monocular tracking and mapping: from model-based to data-driven methods by Gadipudi, N., Elamvazuthi, I., Izhar, L.I., Tiwari, L., Hebbalaguppe, R., Lu, C.-K., Doss, A.S.A.

    Published 2022
    “…Finally, the popular benchmarks available for developing and evaluating these algorithms are presented along with a comparative study on a different class of algorithms. …”
    Get full text
    Get full text
    Article
  5. 5

    Damage visualization based on frequency shift of single-mode ultrasound-guided wavefield by Shahrim, Muhamad Azim, Harmin, Mohammad Yazdi, Romli, Fairuz Izzuddin, Chia, Chen Ciang, Jung-Ryul, Lee

    Published 2022
    “…For this study, the damage visualization is performed based on frequency shift of single-mode ultrasound-guided wavefield. …”
    Get full text
    Get full text
    Article
  6. 6

    Tag cloud algorithm with the inclusion of personality traits by Supli, Ahmad Affandi, Shiratuddin, Norshuhada, Ab. Aziz, Azizi

    Published 2014
    “…Since there is no study has tried to create an algorithm that can customize tag cloud visual properties based on personality traits. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Data mining based damage identification using imperialist competitive algorithm and artificial neural network by Gordan, Meisam, Razak, Hashim Abdul, Ismail, Zubaidah, Ghaedi, Khaled

    Published 2018
    “…In this study, to predict the damage severity of sin-gle-point damage scenarios of I-beam structures a data mining based damage identification framework and a hybrid algorithm combining Artificial Neural Network (ANN) and Imperial Competitive Algorithm (ICA), called ICA-ANN method, is proposed. …”
    Get full text
    Get full text
    Article
  8. 8

    EEG-and MRI-based epilepsy source localization using multivariate empirical mode decomposition and inverse solution method by Khosropanah, Pegah

    Published 2018
    “…Few studies considered eye blink artifact removal for purpose of epilepsy source localization studies and most of them used either visual inspection or computer-based approaches which still need of experts’ supervision. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Edge assisted crime prediction and evaluation framework for machine learning algorithms by Adhikary, Apurba, Murad, Saydul Akbar, Munir, Md Shirajum, Choong Seon, Hong Seong

    Published 2022
    “…In particular, this study proposes a crime prediction and evaluation framework for machine learning algorithms of the network edge. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Virtual reality in algorithm programming course: practicality and implications for college students by Dewi, Ika Parma, Ambiyar, Mursyida, Lativa, Effendi, Hansi, Giatman, Muhammad, Efrizon, Hanafi, Hafizul Fahri, Ali, Siti Khadijah

    Published 2024
    “…The ADDIE model is applied in this study to develop products through the stages of analysis, design, development, implementation, and evaluation. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli by Dzulkifli, Muhammad Zulhilmie

    Published 2021
    “…The main goal of this study is to create an online food ordering app using the corresponding Boyer-Moore string matching algorithm. The application evaluation process is carried out by the developer's functionality test to ensure that there are no unnecessary issues in this app, especially in the main feature. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14

    Subspace Techniques for Brain Signal Enhancement by Kamel , Nidal, Yusoff, Mohd Zuki

    Published 2009
    “…Next, the validity and the effectiveness of the algorithms to detect the P100's (used in objective assessment of visual pathways) are evaluated using real patient data collected from a hospital. …”
    Get full text
    Get full text
    Book Section
  15. 15

    A novel lip geometry approach for audio-visual speech recognition by Mohd Zamri, Ibrahim

    Published 2014
    “…Third, following on evaluation of integration strategies, a novel method has been developed based on alternative decision fusion strategy, in which the outcome from the visual and speech modality is chosen by measuring the quality of audio based on kurtosis and skewness analysis and driven by white noise confusion. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Using artificial intelligence search in solving the camera placement problem by Altahir, A.A., Asirvadam, V.S., Hamid, N.H.B., Sebastian, P.

    Published 2022
    “…Two case studies are used to evaluate those algorithms, and the camera placement problem is formulated as a coverage maximization problem. …”
    Get full text
    Get full text
    Book
  17. 17

    Segmentation of Magnetic Resonance Brain Images Using Watershed Algorithm by Abdurrahim, Salem Hamed

    Published 2004
    “…The proposed technique based on the watershed algorithm, which is applied to the gradient magnitude of the MRI data. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Visual feedback–based heading control of autonomous underwater vehicle for pipeline corrosion inspection by Khan, A., Ali, S.S.A., Meriaudeau, F., Malik, A.S., Soon, L.S., Seng, T.N.

    Published 2017
    “…The visual feedback and corrosion estimation rely on the same image data during the inspection of the pipeline, hence, reducing the complexity of the overall algorithm. …”
    Get full text
    Get full text
    Article
  19. 19

    Customer mobile behavioral segmentation and analysis in telecom using machine learning by Sharaf Addin, Eman Hussein, Admodisastro, Novia Indriaty, Mohd Ashri, Siti Nur Syahirah, Kamaruddin, Azrina, Chew, Yew Chong

    Published 2021
    “…The study applied analytic pipeline that involved five stages i.e. data generation, data pre-processing, data clustering, clusters analysis, and data visualization. …”
    Get full text
    Get full text
    Article
  20. 20

    Low-light image analysis and contrast enhancement using gaussian process / Loh Yuen Peng by Loh , Yuen Peng

    Published 2018
    “…The second contribution is an in-depth analysis of the collected data, specifically, by studying the global and local pixel intensities, followed by the performance and visualizations of hand-crafted and learned features. …”
    Get full text
    Get full text
    Thesis