Search Results - evolution ((((normalization techniques) OR (visualization technique))) OR (computing techniques))

Refine Results
  1. 1

    Information visualization techniques usage model by Semiu A., Akanmu, Jamaludin, Zulikha

    Published 2013
    “…However, information visualization tool must be appropriately used in context of the data to be visualized, and the information intended to be conveyed in order not to mislead or confuse the users.In view of guiding designers of information visualization tools in making appropriate choice with regards to visualization and interaction techniques that fit in, this study employs content analysis of past researches on information visualization to present a usage model for information visualization techniques.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2
  3. 3

    Critical review of object detection techniques for traffic light detection in intelligent transportation systems by Muhammad Adhwa, Mohd Salemi, Muhammad Arif, Mohamad

    Published 2025
    “…Despite progress in deep learning and optimization algorithms, traffic light detection still faces persistent challenges under varying conditions such as illumination changes, occlusions, and visual clutter. This study provides a critical review of object detection techniques specifically for traffic light detection, evaluating the evolution of machine learning frameworks, deep learning architectures, and hybrid optimization models. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Iris Segmentation Analysis Using Integro-Differential Operator And Hough Transform In Biometric System by Zainal Abidin, Zaheera, Anawar, Syarulnaziah, Ayop, Zakiah, Manaf, Mazani, Shibghatullah, A.S., Mohd Yunos, S.H.A.

    Published 2012
    “…Iris segmentation is foremost part of iris recognition system.There are four steps in iris recognition: segmentation,normalization,encoding and matching.Here, iris segmentation has been implemented using Hough Transform and IntegroDifferential Operator techniques.The performance of iris recognition system depends on segmentation and normalization technique.Iris recognition systems capture an image from individual eye.Then the image captured is segmented and normalized for encoding process.The matching technique,Hamming Distance,is used to match the iris codes of iris in the database weather it is same with the newly enrolled for verification stage.These processes produce values of average circle pupil,average circle iris,error rate and edge points.The values provide acceptable measures of accuracy False Accept Rate (FAR) or False Reject Rate (FRR).Hough Transform algorithm,provide better performance,at the expense of higher computational complexity.It is used to evolve a contour that can fit to a non-circular iris boundary.However,edge information is required to control the evolution and stopping the contour.The performance of Hough Transform for CASIA database was 80.88% due to the lack of edge information.The GAR value using Hough Transform is 98.9% genuine while 98.6% through Integro-Differential Operator.…”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Iris Segmentation Analysis using Integro-Differential Operator and Hough Transform in Biometric System by Zainal Abidin, Zaheera, -, M.Manaf, Shibghatullah, Abdul Samad, -, S.H.A.Mohd Yunos, -, S.Anawar, -, Z.Ayop

    Published 2012
    “…The performance of iris recognition system depends on segmentation and normalization technique. Iris recognition systems capture an image from individual eye. …”
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    An algorithmic framework for multiobjective optimization by Ganesan, T., Elamvazuthi, I., Shaari, K.Z.K., Vasant, P.

    Published 2013
    “…Various metaheuristic techniques such as differential evolution (DE), genetic algorithm (GA), gravitational search algorithm (GSA), and particle swarm optimization (PSO) have been used in conjunction with scalarization techniques such as weighted sum approach and the normal-boundary intersection (NBI) method to solve MO problems. …”
    Get full text
    Get full text
    Article
  8. 8

    Reliability assessment of power system generation adequacy with wind power using population-based intelligent search methods by Kadhem, Athraa Ali

    Published 2017
    “…This study sought to examine the performance of three newly proposed techniques, for reliability assessment of the power systems, namely Disparity Evolution Genetic Algorithm (DEGA), Binary Particle Swarm Optimisation (BPSO), and Differential Evolution Optimization Algorithm (DEOA). …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Japanese computer-aided learning package / Siti Nur Hidayah Johar by Siti Nur Hidayah , Johar

    Published 2005
    “…NihonGo was developed using incremental evolution through rapid prototyping technique. The development tool used include Visual Basic.NET, Microsoft Access 2003, Adobe Photoshop CS, and Macromedia Flash MX 2004 and so on. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Malaysian pineapple (Yankee) leaf fiber composites damage investigation using non-destructive techniques by Najeeb, Muhammad Imran

    Published 2022
    “…Three types of composites, pineapple leaf fiber composite (P), pineapple leaf fiber/glass fiber composite (GPG), glass fiber composite (GGGG) were evaluated for low velocity impact (LVI) properties. Visual inspection, computed tomography (CT) scan, digital detector array (DDA) radiography and infrared (IR) thermography techniques were applied to detect the damage evolution of the impacted composites. …”
    Get full text
    Get full text
    Thesis
  11. 11

    How normalization can be linked with theory of planned behavior towards the actual behavior of green practice on mobile phone by Wong, Ling Chai, Oswald @ Aisat Igau, Stephen Laison Sondoh Jr

    Published 2018
    “…The evolution of mobile phones into smart multi-functional mobile computers have led to a serious Abnormal Battery Drain (ABD) issue. …”
    Get full text
    Get full text
    Article
  12. 12

    Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain by Mehdi , Hussain

    Published 2017
    “…Furthermore, the PBPVD adjustment process would be ideal to exploit in all existing PVD-based techniques to enhance its capacity without degrading the visual quality. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    A review on monocular tracking and mapping: from model-based to data-driven methods by Gadipudi, N., Elamvazuthi, I., Izhar, L.I., Tiwari, L., Hebbalaguppe, R., Lu, C.-K., Doss, A.S.A.

    Published 2022
    “…Visual odometry and visual simultaneous localization and mapping aid in tracking the position of a camera and mapping the surroundings using images. …”
    Get full text
    Get full text
    Article
  14. 14

    VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS. by FAROOQ, HUMERA

    Published 2012
    “…The Genetic Algorithm is an area in the field of Artificial Intelligence that is founded on the principles of biological evolution. Visualization techniques help in understanding the searching behaviour of Genetic Algorithm. lt also makes possible the user interactions during the searching process. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Representation Of Rational Bézier Quadratics Using Genetic Algorithm, Differential Evolution And Particle Swarm Optimization by Yahya, Zainor Ridzuan

    Published 2013
    “…For each proposed soft computing technique, parameter tuning is done as an essential study. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Selective harmonic elimination in cascaded H-bridge multilevel inverter using hybrid APSO algorithm / Mudasir Ahmed by Mudasir , Ahmed

    Published 2019
    “…Regardless of many benefits of BIAs, the issues like local minima, less precision, slow convergence rate, and computational complexity are the core optimization problems which required some serious consideration to acquire the maximum benefit from the SHEPWM technique. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Exploration of COVID‑19 data in Malaysia through mapper graph by Carey Ling, Yu Fan, Piau, Phang, Liew, Siaw Hong, Vivek Jason, Jayaraj, Benchawan, Wiwatanapataphee

    Published 2024
    “…This research provides valuable insights for comprehending the pandemic timeline in Malaysia via the Mapper algorithm, which serves as a highly compact data visualization technique.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Differential evolution technique of HEPWM for three-phase voltage source inverter by Azziddin, Mohamad Razali, Kamisman, Norazelina, Jurifa, Mat Lazi, Bahari, Norhazilina

    Published 2016
    “…This paper presents the execution of Differential Evolution (DE) algorithm in order to understand the principle operation of Harmonic Elimination Pulse-Width Modulation (HEPWM) switching technique. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Artificial neural controller synthesis for TORCS by Shi, Jun Long

    Published 2015
    “…The main motivation of this research is to investigate whether hybrid Differential Evolution (DE) and Feed-forward Neural Network (FFNN) as well as hybrid Pareto-based Differential Evolution (POE) and FFNN could generate better controllers that could replace normal NPC used in the car racing games. …”
    Get full text
    Get full text
    Thesis