Search Results - (( data evaluation method algorithm ) OR ( data visualization based algorithm ))

Refine Results
  1. 1
  2. 2

    Tag clouds algorithm with the inclusion of personality traits by Ahmad Affandi, Supli

    Published 2015
    “…Tag clouds have emerged as the latest technique in information visualization using text analysis methods in a variety of situations to interpret unstructured data types. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5

    A review on monocular tracking and mapping: from model-based to data-driven methods by Gadipudi, N., Elamvazuthi, I., Izhar, L.I., Tiwari, L., Hebbalaguppe, R., Lu, C.-K., Doss, A.S.A.

    Published 2022
    “…Astounding results from early methods based on filtering have intrigued the community to extend these algorithms using other forms of techniques like bundle adjustment and deep learning. …”
    Get full text
    Get full text
    Article
  6. 6

    Reversible Watermarking Based on Sorting Prediction Algorithm by Khalid, Edris, Jasni, Mohamad Zain, Tuty Asmawaty, Abdul Kadir

    Published 2015
    “…The performance of the proposed reversible watermarking algorithm is evaluated and compared with Sachnev et al method and other methods. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Damage visualization based on frequency shift of single-mode ultrasound-guided wavefield by Shahrim, Muhamad Azim, Harmin, Mohammad Yazdi, Romli, Fairuz Izzuddin, Chia, Chen Ciang, Jung-Ryul, Lee

    Published 2022
    “…Ultrasonic wavefield inspection has been available for a while and it is a great method for damage detection. However, the challenge lies in the complexity of the algorithm for mode isolation. …”
    Get full text
    Get full text
    Article
  8. 8

    Data mining based damage identification using imperialist competitive algorithm and artificial neural network by Gordan, Meisam, Razak, Hashim Abdul, Ismail, Zubaidah, Ghaedi, Khaled

    Published 2018
    “…In this study, to predict the damage severity of sin-gle-point damage scenarios of I-beam structures a data mining based damage identification framework and a hybrid algorithm combining Artificial Neural Network (ANN) and Imperial Competitive Algorithm (ICA), called ICA-ANN method, is proposed. …”
    Get full text
    Get full text
    Article
  9. 9

    Evaluation and Comparative Analysis of Feature Extraction Methods on Image Data to increase the Accuracy of Classification Algorithms by Rachmad, Iqbal, Tri Basuki, Kurniawan, Misinem, ., Edi Surya, Negara, Tata, Sutabri

    Published 2024
    “…Feature extraction is essential in classification, especially for data sources in the form of images. It involves identifying and isolating relevant information from the images that classification algorithms can use to distinguish between different fruit categories. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Reversible Watermarking Based on Sorting Prediction Scheme by Fakhreldin, Mohammed Adam Ibrahim, Khalid, Edris, Jasni, Mohamad Zain, Tuty Asmawaty, Abdul Kadir, Khalid, Adam

    Published 2014
    “…The performance of the proposed reversible watermarking algorithm is evaluated and compared with Sachnev et al method. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Tag cloud algorithm with the inclusion of personality traits by Supli, Ahmad Affandi, Shiratuddin, Norshuhada, Ab. Aziz, Azizi

    Published 2014
    “…Since there is no study has tried to create an algorithm that can customize tag cloud visual properties based on personality traits. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    An improved plant identification system by Fuzzy c-means bag of visual words model and sparse coding by Safa, Soodabeh, Khalid, Fatimah

    Published 2020
    “…Classic bag of visual words algorithm is based on k-means clustering and every SIFT features belongs to one cluster and it leads to decreasing classification results. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    EEG-and MRI-based epilepsy source localization using multivariate empirical mode decomposition and inverse solution method by Khosropanah, Pegah

    Published 2018
    “…Therefore, a standardized algorithm with less supervision is desired to utilize ESL for pre-surgical evaluation. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Development of a Spatiotemporal Data Model for Management and Visualization of Surface Movement Data by Mohd Rahim, Mohd Shafry

    Published 2008
    “…In order to test and evaluate the SMST Data Model, a database management system with a loading and a retrieval algorithm suitable to this model were developed. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Flow regime identification of particles conveying in pneumatic pipeline using electric charge tomography and neural network techniques by Ahmed Sabit, Hakilo

    Published 2006
    “…A high speed data acquisition card DAS1800HC is used to interface the sensors to a personal computer which processes the data using linear back projection algorithm (LBPA) and filtered back projection algorithm (FBPA). …”
    Get full text
    Get full text
    Thesis
  16. 16

    Virtual reality in algorithm programming course: practicality and implications for college students by Dewi, Ika Parma, Ambiyar, Mursyida, Lativa, Effendi, Hansi, Giatman, Muhammad, Efrizon, Hanafi, Hafizul Fahri, Ali, Siti Khadijah

    Published 2024
    “…Meanwhile, the effectiveness test shows that this VR product can improve learning outcomes better than traditional learning methods. Overall, the VR products developed have proven to be practical and effective in learning programming algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli by Dzulkifli, Muhammad Zulhilmie

    Published 2021
    “…The main goal of this study is to create an online food ordering app using the corresponding Boyer-Moore string matching algorithm. The application evaluation process is carried out by the developer's functionality test to ensure that there are no unnecessary issues in this app, especially in the main feature. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Multi-trial extended subspace-based approach for visually evoked potentials (VEPs) extraction by Kamel , Nidal, Malik, Aamir Saeed

    Published 2013
    “…In the second experiment, the two algorithms are used to estimate the latency of P100 for objective evaluation of visual pathway conduction. …”
    Get full text
    Citation Index Journal
  19. 19

    Edge assisted crime prediction and evaluation framework for machine learning algorithms by Adhikary, Apurba, Murad, Saydul Akbar, Munir, Md Shirajum, Choong Seon, Hong Seong

    Published 2022
    “…To anticipate occurrences, ML methods such as Decision Trees, Neural Networks, K-Nearest Neighbors, and Impact Learning are being utilized, and their performance is compared based on the data processing and modification used. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Customer mobile behavioral segmentation and analysis in telecom using machine learning by Sharaf Addin, Eman Hussein, Admodisastro, Novia Indriaty, Mohd Ashri, Siti Nur Syahirah, Kamaruddin, Azrina, Chew, Yew Chong

    Published 2021
    “…The study applied analytic pipeline that involved five stages i.e. data generation, data pre-processing, data clustering, clusters analysis, and data visualization. …”
    Get full text
    Get full text
    Article