Search Results - (( based evaluation method algorithm ) OR ( data visualization techniques algorithm ))
Search alternatives:
- visualization techniques »
- data visualization »
- based evaluation »
- method algorithm »
-
1
Tag clouds algorithm with the inclusion of personality traits
Published 2015“…Tag clouds have emerged as the latest technique in information visualization using text analysis methods in a variety of situations to interpret unstructured data types. …”
Get full text
Get full text
Get full text
Thesis -
2
Visual Simultaneous Localization and Mapping Using Direct-Based Method for Unmanned Aerial Vehicle (UAV)
Published 2023“…The Direct Sparse Odometry (DSO) technique is a new form of visual odometry that makes use of a direct and sparse structure to achieve precision. …”
Get full text
Get full text
Get full text
Article -
3
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
4
Damage visualization based on frequency shift of single-mode ultrasound-guided wavefield
Published 2022“…This technique is evaluated to detect artificial damages of 2 mm and 30 mm diameter in steel plates. …”
Get full text
Get full text
Article -
5
A review on monocular tracking and mapping: from model-based to data-driven methods
Published 2022“…Astounding results from early methods based on filtering have intrigued the community to extend these algorithms using other forms of techniques like bundle adjustment and deep learning. …”
Get full text
Get full text
Article -
6
-
7
Evaluation and Comparative Analysis of Feature Extraction Methods on Image Data to increase the Accuracy of Classification Algorithms
Published 2024“…The feature extraction methods evaluated were Grayscale Pixel Values, Mean Pixel Value of Channels, and Extracting Edge Features. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Tag cloud algorithm with the inclusion of personality traits
Published 2014“…Since there is no study has tried to create an algorithm that can customize tag cloud visual properties based on personality traits. …”
Get full text
Get full text
Get full text
Article -
9
Data mining based damage identification using imperialist competitive algorithm and artificial neural network
Published 2018“…In this study, to predict the damage severity of sin-gle-point damage scenarios of I-beam structures a data mining based damage identification framework and a hybrid algorithm combining Artificial Neural Network (ANN) and Imperial Competitive Algorithm (ICA), called ICA-ANN method, is proposed. …”
Get full text
Get full text
Article -
10
EEG-and MRI-based epilepsy source localization using multivariate empirical mode decomposition and inverse solution method
Published 2018“…Therefore, a standardized algorithm with less supervision is desired to utilize ESL for pre-surgical evaluation. …”
Get full text
Get full text
Thesis -
11
Multi-trial extended subspace-based approach for visually evoked potentials (VEPs) extraction
Published 2013“…In the second experiment, the two algorithms are used to estimate the latency of P100 for objective evaluation of visual pathway conduction. …”
Get full text
Citation Index Journal -
12
Subspace Techniques for Brain Signal Enhancement
Published 2009“…Next, the validity and the effectiveness of the algorithms to detect the P100's (used in objective assessment of visual pathways) are evaluated using real patient data collected from a hospital. …”
Get full text
Get full text
Book Section -
13
Flow regime identification of particles conveying in pneumatic pipeline using electric charge tomography and neural network techniques
Published 2006“…A high speed data acquisition card DAS1800HC is used to interface the sensors to a personal computer which processes the data using linear back projection algorithm (LBPA) and filtered back projection algorithm (FBPA). …”
Get full text
Get full text
Thesis -
14
The evaluation of content-oriented XML document retrieval: a case study of FTMSK official letter / Hayati Abdul Rahman
Published 2006“…The inverted file method has been used for the indexing techniques to develop the indexing algorithm of the FTMSK official letter. …”
Get full text
Get full text
Research Reports -
15
The evaluation of contentoriented XML document retrieval: a case study of official letter / Hayati Abd Rahman
Published 2006“…The inverted file method has been used for the indexing techniques to develop the indexing algorithm of the FTMSK official letter. …”
Get full text
Get full text
Research Reports -
16
Segmentation of Magnetic Resonance Brain Images Using Watershed Algorithm
Published 2004“…The proposed technique based on the watershed algorithm, which is applied to the gradient magnitude of the MRI data. …”
Get full text
Get full text
Thesis -
17
Edge assisted crime prediction and evaluation framework for machine learning algorithms
Published 2022“…In particular, this study proposes a crime prediction and evaluation framework for machine learning algorithms of the network edge. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Detection of defect in concrete using elastic wave tomography reconstruction technique / Liu Kit Fook
Published 2017“…Hence, detection and assessment of defects in structures have to be carried out effectively. The tomography technique is one of the NDE methods that evaluate soundness of concrete structures by providing visualization to its interior. …”
Get full text
Get full text
Thesis -
19
An enhanced sequential exception technique for semantic-based text anomaly detection
Published 2019“…If these challenges are not properly resolved, identifying semantic-based text anomaly will be less accurate. This study proposes an Enhanced Sequential Exception Technique (ESET) to detect semantic-based text anomaly by achieving five objectives: (1) to modify Sequential Exception Technique (SET) in processing unstructured text; (2) to optimize Cosine Similarity for identifying similar and dissimilar text data; (3) to hybridize modified SET with Latent Semantic Analysis (LSA); (4) to integrate Lesk and Selectional Preference algorithms for disambiguating senses and identifying text canonical form; and (5) to represent semantic-based text anomaly using First Order Logic (FOL) and Concept Network Graph (CNG). …”
Get full text
Get full text
Get full text
Thesis -
20
Using artificial intelligence search in solving the camera placement problem
Published 2022“…Two case studies are used to evaluate those algorithms, and the camera placement problem is formulated as a coverage maximization problem. …”
Get full text
Get full text
Book
