Search Results - (( data identification method algorithm ) OR ( data visualization study algorithm ))
Search alternatives:
- identification method »
- data identification »
- visualization study »
- data visualization »
- method algorithm »
-
1
Data mining based damage identification using imperialist competitive algorithm and artificial neural network
Published 2018“…In this study, to predict the damage severity of sin-gle-point damage scenarios of I-beam structures a data mining based damage identification framework and a hybrid algorithm combining Artificial Neural Network (ANN) and Imperial Competitive Algorithm (ICA), called ICA-ANN method, is proposed. …”
Get full text
Get full text
Article -
2
Tag clouds algorithm with the inclusion of personality traits
Published 2015“…Tag clouds have emerged as the latest technique in information visualization using text analysis methods in a variety of situations to interpret unstructured data types. …”
Get full text
Get full text
Get full text
Thesis -
3
Damage visualization based on frequency shift of single-mode ultrasound-guided wavefield
Published 2022“…Then, generation of frequency map based on ultrasound spectral imaging (USI) for damage identification is investigated. Last but not least, the comparison of accuracy between frequency analysis algorithm and variable time window amplitude mapping (VTWAM) algorithm is performed. …”
Get full text
Get full text
Article -
4
Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique
Published 2018“…Signal processing is an important tool to analyse non-stationary and non linear data. Many techniques of analysis are available to process non stationary and non-linear data such as FFT, wavelets transform, and demodulation analysis. …”
Get full text
Get full text
Thesis -
5
Cabbage disease detection system using k-NN algorithm
Published 2022“…Finally, the KNN algorithm will be used to classify the disease based on sample nature and a cabbage disease data set. …”
Get full text
Get full text
Get full text
Academic Exercise -
6
Automated Bird Species Identification Through Machine Learning Techniques
Published 2024“…This study explores the application of these advanced models in identifying bird species from visual data, discussing key challenges, methodologies, and the potential to achieve high classification accuracy with reliable confidence scores. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Classification of labour pain using electroencephalogram signal based on wavelet method / Sai Chong Yeh
Published 2020“…This study proposed an integrated system for EEG signals pre-processing by using machine learning algorithms in the identification of artifactual components during the process of Wavelet-ICA. …”
Get full text
Get full text
Get full text
Thesis -
8
Defects identification on semiconductor wafer for yield improvement using machine learning / Pedram Tabatabaeemoshiri
Published 2025“…This work presents a novel graph-based semi-supervised learning (GSSL) algorithm designed for wafer defect detection. The proposed methodology involves collecting wafer inspection data, extracting relevant features, and applying the GSSL algorithm to identify the hidden defects. …”
Get full text
Get full text
Get full text
Thesis -
9
Applications of contemporary artificial intelligence technology in forensic odontology as primary forensic identifier : A scoping review
Published 2022“…Background: Forensic odontology may require a visual or clinical method during identification. Sometimes it may require forensic experts to refer to the existing technique to identify individuals, for example, by using the atlas to estimate the dental age. …”
Get full text
Get full text
Get full text
Article -
10
Identifying the mechanism to forecast the progression of Alzheimer’s disease from mild cognitive impairment using deep learning
Published 2022“…Thus, this study aims to identify the progression of AD for patients with MCI using only structural MRI data. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Automatic identification of epileptic seizures from EEG signals using sparse representation-based classification
Published 2020“…Compared to state-of-the-art algorithms and other common methods, our method outperformed them in terms of sensitivity, specificity, and accuracy. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
12
Fault Tolerance for Complex System
Published 2016“…For the purpose of visualizing the fault detection and isolation process, a two wheel robot is used in this study as a representation of a complex system. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Oil palm female inflorescences anthesis stages identification using selected emissivities through thermal imaging and Machine Learning
Published 2022“…Different ML algorithms such as Random Forest (RF), k Nearest Neighbor (kNN), Support Vector Machine (SVM), Artificial Neural Network (ANN) as well as an ensemble method are used on data extracted from thermal images collected during infield oil palms pollination stages monitoring. …”
Get full text
Get full text
Get full text
Thesis -
14
Fusion of airborne LiDAR with multispectral SPOT 5 image for enhancement of feature extraction using Dempster–Shafer theory
Published 2014“…This paper presents an application of data-driven Dempster-Shafer theory (DST) of evidence to fuse multisensor data for land-cover feature extraction. …”
Get full text
Get full text
Article -
15
Recursive Subspace Identification Algorithm Using The Propagator Based Method
Published 2017“…Subspace model identification (SMI) method is the effective method in identifying dynamic state space linear multivariable systems and it can be obtained directly from the input and output data. …”
Get full text
Get full text
Get full text
Article -
16
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…The first and second proposed methods were incorporated into the proposed Background Pass-Go (BPG) system and Visual Identification Protocol Professional (VIP Pro) system respectively. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Fault Tolerance For Two Wheel Mobile Robot Using FSM (Finite State Machine)
Published 2017“…Fault Tolerance is an umbrella term for fault detection, fault isolation, fault identification and fault solving. To better visualize the fault detection and isolation process, a two wheel robot is used in this study to represent the complex system. …”
Get full text
Get full text
Get full text
Article -
18
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…System identification is a method of determining a mathematical relation between variables and terms of a process based on observed input-output data. …”
Get full text
Get full text
Get full text
Article -
19
Date store management in sliding window based on-line identification algorithms
Published 2001“…Sliding window identification algorithms use information from a store of data to optimise on-line learning. …”
Get full text
Get full text
Conference or Workshop Item -
20
Improved Cheating Detection in Examinations using YOLOv8 with Attention Mechanism
Published 2025“…An original dataset, representing various cheating methods in paper-based exams, was manually compiled due to the absence of suitable open-source data. …”
Get full text
Get full text
Get full text
Thesis
