Search Results - (( data normalization research algorithm ) OR ( data visualization using algorithm ))

Refine Results
  1. 1

    Classification of Cardiac Disorders Based on Electrocardiogram Data with Fuzzy Cognitive Map (FCM) Algorithm Approach by Sumiati, ., Hoga, Saragih, T.K.A, Rahman, Viktor Vekky, Ronald Repi, Agung, Triayudi

    Published 2021
    “…Meanwhile, the re�sult of abnormal heart convergence process has the lowest convergence value of 0.49 and the highest convergence value of 0.87. This research contributes to the world of health, where we classify the Electrocardiogram (ECG) data, so that it can classify abnormal and normal cardiac disorders using the Fuzzy Cognitive Map (FCM) algorithm.…”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Visual analysis to investigate the capability of ANFIS in modelling hydrological relationship using synthetic dataset by Ngahzaifa, Ab. Ghani, Zuriani, Mustaffa, Zafril Rizal, M Azmi

    Published 2018
    “…In using most of the machine learning algorithms including ANFIS, to obtain the best model, the common and normal approach is always by comparing models of different parameter settings based on the goodness-offit statistical measures. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Development of Technical Safety Dashboard Using Microsoft Power BI Integration with R by Mohd Shamim, Nur Farisha Shuhada

    Published 2020
    “…Besides, this paper also enlightens on one of the Machine Learning tools used which is R, with the utilization of K Nearest Neighbor (KNN) algorithm as method of classification for data. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    Investigation of data encryption algorithm for secured transmission of electrocardiograph (ECG) signal by Shaikh, Muhammad Umair, Ahmad, Siti Anom, Wan Adnan, Wan Azizun

    Published 2018
    “…The system will alert for further diagnosis if the condition is critical, so it will help medical practitioner for further detection of arrhythmias and medical researcher for further studies. The security and privacy features of the system protect the authenticity and confidentiality of the patient's medical data and are implemented using security enhancing techniques. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Algorithms for moderating effect of emotional value from a cross-media data fusion perspective: a case study of Chinese dating reality shows by Zhang, Shasha, Dong, Qiming, Yasin, Megat Al Imran, Fang, Ng Chwee

    Published 2026
    “…Preprocessing removes noise from text data, normalizes sentiment word lists and undertakes temporal transformation. …”
    Get full text
    Get full text
    Article
  6. 6

    Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique by Muhammad Hanafi, Yusop

    Published 2018
    “…Previous researchers normally select the IMF visually, based on the user’s experience, and introduced a merit index that allows the automatic selection of the IMF. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Design and data analysis for a belt-for-blind for visual impaired people by Hossain, Eklas, Khan, Md. Raisuddin, Ali, Ahad

    Published 2011
    “…Based on the analyses of the acquired data, we have developed an algorithm capable of classifying various types of obstacles. …”
    Get full text
    Get full text
    Article
  8. 8

    Converged Classification Network For Matching Cost Computation by Hamid, Mohd Saad, Abd Manap, Nurulfajar, Hamzah, Rostam Affendi, Kadmin, Ahmad Fauzan

    Published 2020
    “…Stereoscopic vision lets us identify the world around us in 3D by incorporating data from depth signals into a clear visual model of the world. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Real-time measurement and gait detection algorithm for motion control of active ankle foot orthosis / Aminuddin Hamid by Hamid, Aminuddin

    Published 2015
    “…The data acquired from force sensors during walking condition is transferred to the host computer powered by LabVIEW software for visualization and analysis. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Enhanced emotion recognition in videos: a convolutional neural network strategy for human facial expression detection and classification by Ashraf, Arselan, Gunawan, Teddy Surya, Arifin, Fatchul, Kartiwi, Mira, Sophian, Ali, Habaebi, Mohamed Hadi

    Published 2023
    “…Despite extensive research employing machine learning algorithms like convolutional neural networks (CNN), challenges remain concerning input data processing, emotion classification scope, data size, optimal CNN configurations, and performance evaluation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Moving objects detection from UAV captured videos using trajectories of matched regional adjacency graphs by Harandi, Bahareh Kalantar Ghorashi

    Published 2017
    “…In the past, MOD was mainly tackled using image registration, which discovers correspondences between consecutive frames using pair-wise grayscale spatial visual appearance matching under rigid and affine transformations. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15
  16. 16

    Budget visualizer using circle packing technique / Nursyahira Zulkeply by Zulkeply, Nursyahira

    Published 2019
    “…In order to construct this data visualization, the circle packing algorithm is used to visualize these budgets. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    A stable and accurate wavelet-based method for noise reduction from hyperspectral vegetation spectrum by Mohd Shafri, Helmi Zulhaidi, Ebadi, Ladan

    Published 2015
    “…Additionally, hyperspectral signals are usually studied using the derivative analysis method that is very sensitive to noise in the data. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Get full text
    Thesis