Search Results - (( data visualization _ algorithm ) OR ( data evaluation method algorithm ))

Refine Results
  1. 1
  2. 2

    Tag clouds algorithm with the inclusion of personality traits by Ahmad Affandi, Supli

    Published 2015
    “…Tag clouds have emerged as the latest technique in information visualization using text analysis methods in a variety of situations to interpret unstructured data types. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Enhanced Flipping Technique to Reduce Variability in Image Steganography by Kamil S., Abdullah S.N.H.S., Hasan M.K., Bohani F.A.

    Published 2023
    “…Benchmarking; Discrete cosine transforms; Genetic algorithms; Image coding; Image enhancement; Mean square error; Signal to noise ratio; Bayes method; Cover-image; Data hidden; Embedding capacity; Flipping methods; Least significant bits; Medium; Optimisations; Variability; Visual qualities; Steganography…”
    Article
  4. 4

    Visual Simultaneous Localization and Mapping Using Direct-Based Method for Unmanned Aerial Vehicle (UAV) by M. H., Badzli, N., Mohamad Yatim, A., Jamaludin, Z., Mohd Noh, M. I., Idris, N. A., Sulaiman, Nur Aqilah, Othman

    Published 2023
    “…From this project it is concluded that DSO on UAV can be improved in order to gain a stable data processing to be applied in the algorithm.…”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    A review on monocular tracking and mapping: from model-based to data-driven methods by Gadipudi, N., Elamvazuthi, I., Izhar, L.I., Tiwari, L., Hebbalaguppe, R., Lu, C.-K., Doss, A.S.A.

    Published 2022
    “…This article starts by introducing the basic sensor systems and analyzing the evolution of monocular tracking and mapping algorithms through bibliometric data. Then, it covers the overview of filtering and bundle adjustment methods, followed by recent advancements in methods using deep learning with the mathematical constraints applied on the networks. …”
    Get full text
    Get full text
    Article
  6. 6

    Challenges in multi-layer data security for video steganography by Samar Kamil, Masri Ayob, Siti Norul Huda Sheikh Abdullah, Zulkifli Ahmad

    Published 2018
    “…On the other side, the hybridization of the algorithms, increase memory complexity and increase computation time for data embedding. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Reversible Watermarking Based on Sorting Prediction Algorithm by Khalid, Edris, Jasni, Mohamad Zain, Tuty Asmawaty, Abdul Kadir

    Published 2015
    “…The performance of the proposed reversible watermarking algorithm is evaluated and compared with Sachnev et al method and other methods. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Evaluation and Comparative Analysis of Feature Extraction Methods on Image Data to increase the Accuracy of Classification Algorithms by Rachmad, Iqbal, Tri Basuki, Kurniawan, Misinem, ., Edi Surya, Negara, Tata, Sutabri

    Published 2024
    “…Feature extraction is essential in classification, especially for data sources in the form of images. It involves identifying and isolating relevant information from the images that classification algorithms can use to distinguish between different fruit categories. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Damage visualization based on frequency shift of single-mode ultrasound-guided wavefield by Shahrim, Muhamad Azim, Harmin, Mohammad Yazdi, Romli, Fairuz Izzuddin, Chia, Chen Ciang, Jung-Ryul, Lee

    Published 2022
    “…Ultrasonic wavefield inspection has been available for a while and it is a great method for damage detection. However, the challenge lies in the complexity of the algorithm for mode isolation. …”
    Get full text
    Get full text
    Article
  10. 10

    Data mining based damage identification using imperialist competitive algorithm and artificial neural network by Gordan, Meisam, Razak, Hashim Abdul, Ismail, Zubaidah, Ghaedi, Khaled

    Published 2018
    “…In this study, to predict the damage severity of sin-gle-point damage scenarios of I-beam structures a data mining based damage identification framework and a hybrid algorithm combining Artificial Neural Network (ANN) and Imperial Competitive Algorithm (ICA), called ICA-ANN method, is proposed. …”
    Get full text
    Get full text
    Article
  11. 11

    Tag cloud algorithm with the inclusion of personality traits by Supli, Ahmad Affandi, Shiratuddin, Norshuhada, Ab. Aziz, Azizi

    Published 2014
    “…Since there is no study has tried to create an algorithm that can customize tag cloud visual properties based on personality traits. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    An improved plant identification system by Fuzzy c-means bag of visual words model and sparse coding by Safa, Soodabeh, Khalid, Fatimah

    Published 2020
    “…This demonstrate the intensity of the correlation between that aspect of data and a specific cluster. In the classic Bag of visual words model, the Fuzzy c-means algorithm is replaced with K-means and the accuracy of SIFT matching is increased. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    An eigenspace approach for detecting multiple space-time disease clusters: Application to measles hotspots detection in khyber-pakhtunkhwa, Pakistan by Ullah, S., Daud, H., Dass, S.C., Hadi, F.-T., Khalil, A.

    Published 2018
    “…We evaluated the proposed method using the monthly data on measles cases in Khyber-Pakhtunkhwa, Pakistan (Jan 2016- Dec 2016), and the efficiency was compared with the state-of-the-art methods: EigenSpot and Space-time scan statistic (SaTScan). …”
    Get full text
    Get full text
    Article
  14. 14

    An eigenspace approach for detecting multiple space-time disease clusters: Application to measles hotspots detection in khyber-pakhtunkhwa, Pakistan by Ullah, S., Daud, H., Dass, S.C., Hadi, F.-T., Khalil, A.

    Published 2018
    “…We evaluated the proposed method using the monthly data on measles cases in Khyber-Pakhtunkhwa, Pakistan (Jan 2016- Dec 2016), and the efficiency was compared with the state-of-the-art methods: EigenSpot and Space-time scan statistic (SaTScan). …”
    Get full text
    Get full text
    Article
  15. 15

    Reversible Watermarking Based on Sorting Prediction Scheme by Fakhreldin, Mohammed Adam Ibrahim, Khalid, Edris, Jasni, Mohamad Zain, Tuty Asmawaty, Abdul Kadir, Khalid, Adam

    Published 2014
    “…The performance of the proposed reversible watermarking algorithm is evaluated and compared with Sachnev et al method. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    A fast feature extraction algorithm for image and video processing by Abdulhussain, Sadiq H., Ramli, Abdul Rahman, Mahmmod, Basheera M., Saripan, M. Iqbal, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Baker, Thar, Flayyih, Wameedh Nazar, Jassim, Wissam A.

    Published 2019
    “…The standard TRECVID 2005, 2006, and 2007 video datasets are used to evaluate the performance of the SBD applications. The achieved results show that the proposed algorithm significantly reduces the computational cost in comparison to the traditional method.…”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Musical instrument identification using Convolutional Neural Network (CNN) algorithm / Muhammad Nur Azri Irfan Abdul Rahman by Abdul Rahman, Muhammad Nur Azri Irfan

    Published 2025
    “…This approach tried to overcome the limitations of the manual method and traditional algorithm, which tends to fail with the diverse dataset, diverse visual features, and scalability. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Development of a Spatiotemporal Data Model for Management and Visualization of Surface Movement Data by Mohd Rahim, Mohd Shafry

    Published 2008
    “…In order to test and evaluate the SMST Data Model, a database management system with a loading and a retrieval algorithm suitable to this model were developed. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Flow regime identification of particles conveying in pneumatic pipeline using electric charge tomography and neural network techniques by Ahmed Sabit, Hakilo

    Published 2006
    “…A high speed data acquisition card DAS1800HC is used to interface the sensors to a personal computer which processes the data using linear back projection algorithm (LBPA) and filtered back projection algorithm (FBPA). …”
    Get full text
    Get full text
    Thesis