Search Results - evolution ((((computation techniques) OR (visualization technique))) OR (computing techniques))
Search alternatives:
- computation techniques »
- computing techniques »
-
1
Information visualization techniques usage model
Published 2013“…However, information visualization tool must be appropriately used in context of the data to be visualized, and the information intended to be conveyed in order not to mislead or confuse the users.In view of guiding designers of information visualization tools in making appropriate choice with regards to visualization and interaction techniques that fit in, this study employs content analysis of past researches on information visualization to present a usage model for information visualization techniques.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
-
3
Critical review of object detection techniques for traffic light detection in intelligent transportation systems
Published 2025“…Despite progress in deep learning and optimization algorithms, traffic light detection still faces persistent challenges under varying conditions such as illumination changes, occlusions, and visual clutter. This study provides a critical review of object detection techniques specifically for traffic light detection, evaluating the evolution of machine learning frameworks, deep learning architectures, and hybrid optimization models. …”
Get full text
Get full text
Get full text
Article -
4
Representation Of Rational Bézier Quadratics Using Genetic Algorithm, Differential Evolution And Particle Swarm Optimization
Published 2013“…For each proposed soft computing technique, parameter tuning is done as an essential study. …”
Get full text
Get full text
Thesis -
5
Japanese computer-aided learning package / Siti Nur Hidayah Johar
Published 2005“…NihonGo was developed using incremental evolution through rapid prototyping technique. The development tool used include Visual Basic.NET, Microsoft Access 2003, Adobe Photoshop CS, and Macromedia Flash MX 2004 and so on. …”
Get full text
Get full text
Thesis -
6
Mobile Application: Mobile Assistance for Visually Impaired People - Speech Interface System (SIS)
Published 2023Conference Paper -
7
Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain
Published 2017“…Furthermore, the PBPVD adjustment process would be ideal to exploit in all existing PVD-based techniques to enhance its capacity without degrading the visual quality. …”
Get full text
Get full text
Get full text
Thesis -
8
Malaysian pineapple (Yankee) leaf fiber composites damage investigation using non-destructive techniques
Published 2022“…Three types of composites, pineapple leaf fiber composite (P), pineapple leaf fiber/glass fiber composite (GPG), glass fiber composite (GGGG) were evaluated for low velocity impact (LVI) properties. Visual inspection, computed tomography (CT) scan, digital detector array (DDA) radiography and infrared (IR) thermography techniques were applied to detect the damage evolution of the impacted composites. …”
Get full text
Get full text
Thesis -
9
Data selection mapping in mobile decision making using MCDSS technique
Published 2007“…Multi criteria decision support system (MCDSS) is a decion making technique used in a aplication and system development to help user to solve a problem and make a decision.Along with current computer technology evolution, request for mobile decision support system is increasing tremendously from time to time. …”
Get full text
Get full text
Monograph -
10
Differential evolution technique of HEPWM for three-phase voltage source inverter
Published 2016“…This paper presents the execution of Differential Evolution (DE) algorithm in order to understand the principle operation of Harmonic Elimination Pulse-Width Modulation (HEPWM) switching technique. …”
Get full text
Get full text
Get full text
Article -
11
Harmonic Elimination Pulse Width Modulation Using Differential Evolution Technique For Three Phase Voltage Source Inverter
Published 2018“…Differential Evolution (DE) has been gaining popularity among researchers as an effective yet simple evolutionary algorithm to solve the optimization problems. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Computational intelligence based technique for solving economic dispatch problem / Nur Azzammudin Rahmat
Published 2016“…Therefore, this research proposes a new computational technique termed as Differential Evolution Immunized Ant Colony Optimization (DEIANT) as an approach to solve the complex economic dispatch process. …”
Get full text
Get full text
Book Section -
13
Computational intelligence based technique for solving economic dispatch problem / Nur Azzammudin Rahmat
Published 2016“…Therefore, this research proposes a new computational technique termed as Differential Evolution Immunized Ant Colony Optimization (DEIANT) as an approach to solve the complex economic dispatch process. …”
Get full text
Get full text
Thesis -
14
A survey of energy conservation techniques for mobile wireless communication devices
Published 2016“…Mobile devices have undergone a tremendous evolution over the past two decades.Today, mobile devices are equipped with sensing, communication, computational and entertainment functionalities to deliver a myriad of services to its users.Running these functionalities, however, comes with a huge energy cost.In this paper, we survey general solutions for energy conservation in mobile devices.We classify and provide brief summaries of the energy conservation techniques based on their key research ideas. …”
Get full text
Get full text
Conference or Workshop Item -
15
Solid deformation modeling techniques
Published 2006“…Non-rigid solid object deformations techniques have been widely used in the computer graphics community to simulate and animate deformable objects. …”
Get full text
Get full text
Get full text
Article -
16
Computational intelligence based approach for enhanced distance relay design
Published 2024text::Final Year Project -
17
-
18
Major issues in the development of a Hacker's Code of Ethics / Ahmad Hafidz Baharom Alam Shah
Published 2005“…The first day, the computer was invented. The next day it was hacked. …”
Get full text
Get full text
Thesis -
19
Digital image watermarking, analysis of current methods
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Exploration of COVID‑19 data in Malaysia through mapper graph
Published 2024“…This research provides valuable insights for comprehending the pandemic timeline in Malaysia via the Mapper algorithm, which serves as a highly compact data visualization technique.…”
Get full text
Get full text
Get full text
Get full text
Article
