Search Results - (( data identification method algorithm ) OR ( data visualization study algorithm ))

Refine Results
  1. 1

    Data mining based damage identification using imperialist competitive algorithm and artificial neural network by Gordan, Meisam, Razak, Hashim Abdul, Ismail, Zubaidah, Ghaedi, Khaled

    Published 2018
    “…In this study, to predict the damage severity of sin-gle-point damage scenarios of I-beam structures a data mining based damage identification framework and a hybrid algorithm combining Artificial Neural Network (ANN) and Imperial Competitive Algorithm (ICA), called ICA-ANN method, is proposed. …”
    Get full text
    Get full text
    Article
  2. 2

    Tag clouds algorithm with the inclusion of personality traits by Ahmad Affandi, Supli

    Published 2015
    “…Tag clouds have emerged as the latest technique in information visualization using text analysis methods in a variety of situations to interpret unstructured data types. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Damage visualization based on frequency shift of single-mode ultrasound-guided wavefield by Shahrim, Muhamad Azim, Harmin, Mohammad Yazdi, Romli, Fairuz Izzuddin, Chia, Chen Ciang, Jung-Ryul, Lee

    Published 2022
    “…Then, generation of frequency map based on ultrasound spectral imaging (USI) for damage identification is investigated. Last but not least, the comparison of accuracy between frequency analysis algorithm and variable time window amplitude mapping (VTWAM) algorithm is performed. …”
    Get full text
    Get full text
    Article
  4. 4

    Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique by Muhammad Hanafi, Yusop

    Published 2018
    “…Signal processing is an important tool to analyse non-stationary and non linear data. Many techniques of analysis are available to process non stationary and non-linear data such as FFT, wavelets transform, and demodulation analysis. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Cabbage disease detection system using k-NN algorithm by Mohamad Ainuddin Sahimat

    Published 2022
    “…Finally, the KNN algorithm will be used to classify the disease based on sample nature and a cabbage disease data set. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  6. 6

    Automated Bird Species Identification Through Machine Learning Techniques by Suhil Shoukath, Kambali, Ushashree, R.

    Published 2024
    “…This study explores the application of these advanced models in identifying bird species from visual data, discussing key challenges, methodologies, and the potential to achieve high classification accuracy with reliable confidence scores. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Classification of labour pain using electroencephalogram signal based on wavelet method / Sai Chong Yeh by Sai , Chong Yeh

    Published 2020
    “…This study proposed an integrated system for EEG signals pre-processing by using machine learning algorithms in the identification of artifactual components during the process of Wavelet-ICA. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Defects identification on semiconductor wafer for yield improvement using machine learning / Pedram Tabatabaeemoshiri by Pedram , Tabatabaeemoshiri

    Published 2025
    “…This work presents a novel graph-based semi-supervised learning (GSSL) algorithm designed for wafer defect detection. The proposed methodology involves collecting wafer inspection data, extracting relevant features, and applying the GSSL algorithm to identify the hidden defects. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Applications of contemporary artificial intelligence technology in forensic odontology as primary forensic identifier : A scoping review by Norhasmira, Mohammad, Rohana, Ahmad, Arofi, Kurniawan, Mohd Yusmiaidil, Putera Mohd Yusof

    Published 2022
    “…Background: Forensic odontology may require a visual or clinical method during identification. Sometimes it may require forensic experts to refer to the existing technique to identify individuals, for example, by using the atlas to estimate the dental age. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Identifying the mechanism to forecast the progression of Alzheimer’s disease from mild cognitive impairment using deep learning by Hiu, Theresa Wei Xin

    Published 2022
    “…Thus, this study aims to identify the progression of AD for patients with MCI using only structural MRI data. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11

    Automatic identification of epileptic seizures from EEG signals using sparse representation-based classification by Sobhan Sheykhivand, Tohid Yousefi Rezaii, Zohreh Mousavi, Azra Delpak, Ali Farzamnia

    Published 2020
    “…Compared to state-of-the-art algorithms and other common methods, our method outperformed them in terms of sensitivity, specificity, and accuracy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Fault Tolerance for Complex System by Chan, Shi Jing, Pebrianti, Dwi, M. F., Abas, Luhur, Bayuaji

    Published 2016
    “…For the purpose of visualizing the fault detection and isolation process, a two wheel robot is used in this study as a representation of a complex system. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Oil palm female inflorescences anthesis stages identification using selected emissivities through thermal imaging and Machine Learning by Yousefidashliboroun, Mamehgol

    Published 2022
    “…Different ML algorithms such as Random Forest (RF), k Nearest Neighbor (kNN), Support Vector Machine (SVM), Artificial Neural Network (ANN) as well as an ensemble method are used on data extracted from thermal images collected during infield oil palms pollination stages monitoring. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Fusion of airborne LiDAR with multispectral SPOT 5 image for enhancement of feature extraction using Dempster–Shafer theory by Saeidi, Vahideh, Pradhan, Biswajeet, Idrees, Mohammed Oludare, Abd Latif, Zulkiflee

    Published 2014
    “…This paper presents an application of data-driven Dempster-Shafer theory (DST) of evidence to fuse multisensor data for land-cover feature extraction. …”
    Get full text
    Get full text
    Article
  15. 15

    Recursive Subspace Identification Algorithm Using The Propagator Based Method by Jamaludin, Irma Wani, Abdul Wahab, Norhaliza

    Published 2017
    “…Subspace model identification (SMI) method is the effective method in identifying dynamic state space linear multivariable systems and it can be obtained directly from the input and output data. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…The first and second proposed methods were incorporated into the proposed Background Pass-Go (BPG) system and Visual Identification Protocol Professional (VIP Pro) system respectively. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Fault Tolerance For Two Wheel Mobile Robot Using FSM (Finite State Machine) by Chan, Shi Jing, Pebrianti, Dwi, M. F., Abas, Bayuaji, Luhur

    Published 2017
    “…Fault Tolerance is an umbrella term for fault detection, fault isolation, fault identification and fault solving. To better visualize the fault detection and isolation process, a two wheel robot is used in this study to represent the complex system. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification by Abd Samad, Md Fahmi

    Published 2011
    “…System identification is a method of determining a mathematical relation between variables and terms of a process based on observed input-output data. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Date store management in sliding window based on-line identification algorithms by Asirvadam , Vijanth Sagayan, McLoone, Sean, Irwin, George W

    Published 2001
    “…Sliding window identification algorithms use information from a store of data to optimise on-line learning. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Improved Cheating Detection in Examinations using YOLOv8 with Attention Mechanism by YAN, ZUO

    Published 2025
    “…An original dataset, representing various cheating methods in paper-based exams, was manually compiled due to the absence of suitable open-source data. …”
    Get full text
    Get full text
    Get full text
    Thesis