Search Results - evolution ((((computing techniques) OR (visualization technique))) OR (mining techniques))

Search alternatives:

Refine Results
  1. 1

    Information visualization techniques usage model by Semiu A., Akanmu, Jamaludin, Zulikha

    Published 2013
    “…However, information visualization tool must be appropriately used in context of the data to be visualized, and the information intended to be conveyed in order not to mislead or confuse the users.In view of guiding designers of information visualization tools in making appropriate choice with regards to visualization and interaction techniques that fit in, this study employs content analysis of past researches on information visualization to present a usage model for information visualization techniques.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2
  3. 3

    Data mining in computer auditing / Hiromi Wong, Siew Lan and Valery Fred Lee by Hiromi , Wong, Siew , Lan, Valery, Fred Lee

    Published 2004
    “…The report will cover the literature review that started with an introduction to computer auditing, introduction to data mining, data mining techniques (classification, neural network and sequential analysis), and the existing data mining software. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A review of homogenous ensemble methods on the classification of breast cancer data by Nur Farahaina, Idris, Mohd Arfian, Ismail

    Published 2024
    “…Data mining is a concept established by computer scientists to lead a secure and reliable classification and deduction of data. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    A review of homogenous ensemble methods on the classification of breast cancer data by Nur Farahaina, Idris, Mohd Arfian, Ismail

    Published 2024
    “…Data mining is a concept established by computer scientists to lead a secure and reliable classification and deduction of data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Classification with degree of importance of attributes for stock market data mining by Khokhar, Rashid Hafeez, Md. Sap, Mohd. Noor

    Published 2004
    “…Many statistical and data mining techniques have been used to predict time series stock market. …”
    Get full text
    Get full text
    Article
  7. 7

    Suspicious online car advertisement detector using principle component analysis (PCA) / Fathiah Husna Firdaus by Firdaus, Fathiah Husna

    Published 2019
    “…PCA is a dimensionality reduction technique that is robust and ease the visualization task. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Critical review of object detection techniques for traffic light detection in intelligent transportation systems by Muhammad Adhwa, Mohd Salemi, Muhammad Arif, Mohamad

    Published 2025
    “…Despite progress in deep learning and optimization algorithms, traffic light detection still faces persistent challenges under varying conditions such as illumination changes, occlusions, and visual clutter. This study provides a critical review of object detection techniques specifically for traffic light detection, evaluating the evolution of machine learning frameworks, deep learning architectures, and hybrid optimization models. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    A New Hybrid K-Means Evolving Spiking Neural Network Model Based on Differential Evolution by Abdulrazak Yahya, Saleh, Haza Nuzly, Abdull Hamed, Siti Mariyam, Shamsuddin, Ashraf, Osman Ibrahim

    Published 2018
    “…Clustering is one of the essential unsupervised learning techniques in Data Mining. In this paper, a new hybrid (K-DESNN) approach to combine differential evolution and K-means evolving spiking neural network model (K-means ESNN) for clustering problems has been proposed. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  10. 10

    Accelerator-based human activity recognition using voting technique with NBTree and MLP classifiers by Azmi M.S.M., Sulaiman M.N.

    Published 2023
    “…In evolution and ubiquitous computing systems, accelerometer-based human activity recognition has huge potential in a large number of application domains. …”
    Article
  11. 11
  12. 12

    Japanese computer-aided learning package / Siti Nur Hidayah Johar by Siti Nur Hidayah , Johar

    Published 2005
    “…NihonGo was developed using incremental evolution through rapid prototyping technique. The development tool used include Visual Basic.NET, Microsoft Access 2003, Adobe Photoshop CS, and Macromedia Flash MX 2004 and so on. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Malaysian pineapple (Yankee) leaf fiber composites damage investigation using non-destructive techniques by Najeeb, Muhammad Imran

    Published 2022
    “…Three types of composites, pineapple leaf fiber composite (P), pineapple leaf fiber/glass fiber composite (GPG), glass fiber composite (GGGG) were evaluated for low velocity impact (LVI) properties. Visual inspection, computed tomography (CT) scan, digital detector array (DDA) radiography and infrared (IR) thermography techniques were applied to detect the damage evolution of the impacted composites. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Overview and future opportunities of sentiment analysis approaches for big data by Mohd Sharef, Nurfadhlina, Mat Zin, Harnani, Nadali, Samaneh

    Published 2016
    “…SA studies are predicted to be expanded into approaches that utilise scalability, possess high adaptability for source variation, velocity and veracity to maximise value mining for the benefit of the users.…”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain by Mehdi , Hussain

    Published 2017
    “…Furthermore, the PBPVD adjustment process would be ideal to exploit in all existing PVD-based techniques to enhance its capacity without degrading the visual quality. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    A review on monocular tracking and mapping: from model-based to data-driven methods by Gadipudi, N., Elamvazuthi, I., Izhar, L.I., Tiwari, L., Hebbalaguppe, R., Lu, C.-K., Doss, A.S.A.

    Published 2022
    “…Visual odometry and visual simultaneous localization and mapping aid in tracking the position of a camera and mapping the surroundings using images. …”
    Get full text
    Get full text
    Article
  17. 17

    VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS. by FAROOQ, HUMERA

    Published 2012
    “…The Genetic Algorithm is an area in the field of Artificial Intelligence that is founded on the principles of biological evolution. Visualization techniques help in understanding the searching behaviour of Genetic Algorithm. lt also makes possible the user interactions during the searching process. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Representation Of Rational Bézier Quadratics Using Genetic Algorithm, Differential Evolution And Particle Swarm Optimization by Yahya, Zainor Ridzuan

    Published 2013
    “…For each proposed soft computing technique, parameter tuning is done as an essential study. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Mathematical Modeling of Wellbore Flow Behavior in Multilateral Wells by Farah Amalina Azianti Bt Azmi, Farah Amalina Azianti

    Published 2012
    “…The main objective of this project is to develop the computer codes to model the flow behavior in the lateral of multilateral well. …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    Global Trends of Educational Data Mining in Online Learning by Chen, Chwen Jen, Teh, Chee Siong, Dexter Sigan, John

    Published 2023
    “…Educational data mining (EDM) in online learning involves data mining techniques to analyze data from online environments to gain insights into student behavior, performance, and engagement. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article