Search Results - (( based detection method algorithm ) OR ( data visualization tools algorithm ))

Refine Results
  1. 1

    Enhancing data integrity in internet of things-based healthcare applications: A visualization approach for duplicate detection by Emran, Nurul Akmar, Md Isa, Siti NoorBasirah, Harum, Norharyati, Machap, Logenthiran, Nordin, Azlin

    Published 2025
    “…Compared to traditional detection methods, the visualization tool facilitated faster and more intuitive initial data assessment, demonstrating its effectiveness for rapid quality checks in healthcare datasets. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Enhancing data integrity in internet of things-based healthcare applications: a visualization approach for duplicate detection by Md Isa, Siti Noor Basirah, Emran, Nurul Akmar, Harum, Norharyati, Logenthiran, Machap, Nordin, Azlin

    Published 2025
    “…Compared to traditional detection methods, the visualization tool facilitated faster and more intuitive initial data assessment, demonstrating its effectiveness for rapid quality checks in healthcare datasets. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Defects identification on semiconductor wafer for yield improvement using machine learning / Pedram Tabatabaeemoshiri by Pedram , Tabatabaeemoshiri

    Published 2025
    “…This work presents a novel graph-based semi-supervised learning (GSSL) algorithm designed for wafer defect detection. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Chemometrics analysis for the detection of dental caries via ultraviolet absorption spectroscopy / Katrul Nadia Basri by Basri, Katrul Nadia

    Published 2023
    “…The accuracy of the CNN model is comparable with the accuracy of the previous work that utilizing CNN for the imaging data to detect caries (diagnostic tool).…”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7
  8. 8

    Segmentation of Magnetic Resonance Brain Images Using Watershed Algorithm by Abdurrahim, Salem Hamed

    Published 2004
    “…The proposed technique based on the watershed algorithm, which is applied to the gradient magnitude of the MRI data. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Parallel system for abnormal cell growth prediction based on fast numerical simulation by Alias, Norma, Islam, Md. Rajibul, Shahir, Rosdiana, Hamzah, Norhafizah, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Ludin, Eliana, Azami, Masrin

    Published 2010
    “…The paper focuses on a numerical method for detecting, visualizing and monitoring abnormal cell growth using large-scale mathematical simulations. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Identifying suicidal ideation through twitter sentiment analysis using Naïve Bayes / Annasuha Atie Atirah Alias by Alias, Annasuha Atie Atirah

    Published 2023
    “…By harnessing natural language processing techniques and data visualization tools, the project seeks to provide user-friendly solution for early detection and prevention of suicidal intentions expressed on social media. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Intelligent image noise types recognition and denoising system using deep learning / Khaw Hui Ying by Khaw , Hui Ying

    Published 2019
    “…In order to reduce the training time and computational cost of the algorithm, Principal Components Analysis (PCA) pretraining strategy is deployed to obtain data adaptive filter banks. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Exploring frogeye leaf spot disease severity in soybean through hyperspectral data analysis and machine learning with Orange Data Mining by Ang, Yuhao, Mohd Shafri, Helmi Zulhaidi, Al-Habshi, Mohammed Mustafa

    Published 2025
    “…No previous study has investigated Orange mining tool as visual programming approach in analysing hyperspectral reflectance data, especially in crop disease detection. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain by Mehdi , Hussain

    Published 2017
    “…In addition, the proposed methods have proven the robustness against powerful modern SPAM feature based steganalysis detection attacks at low embedding rate.…”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS. by FAROOQ, HUMERA

    Published 2012
    “…A tool termed as VIGA-20 (Visualization of Genetic Algorithm using 2-0 Graph) is implemented to accomplish this goal. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Buildthermo: an algorithm for visualizing building heat dynamics / Amira Shazlin Adnan ... [et al.] by Adnan, Amira Shazlin, Che Ani, Adi Irfan, Mohd Pahroraji, Mohamad Ezad Hafez, Ayob, Mohd Asraf, Wahi, Noraziah

    Published 2024
    “…With an intuitive interface, BUILDthermo empowers stakeholders to visualize and interpret building heat data effortlessly. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Edge Detection Algorithm For Image Processing Of Search And Rescue Robot by A/L Sivem, Prasanthran

    Published 2016
    “…This paper highlights the various edge detection algorithms working method and comparison is made based on the advantages and disadvantages of the algorithms for the identification of an optimum edge detection algorithm. …”
    Get full text
    Get full text
    Final Year Project
  19. 19

    A review of visualization techniques for duplicate detection in cancer datasets by Emran, Nurul Akmar, Maskat, Ruhaila

    Published 2025
    “…To address these issues, the review advocates for the development of practical, user-friendly visualization tools that combine duplicate detection with key indicators of data quality. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Machine learning algorithms in context of intrusion detection by Mehmood, T., Rais, H.B.Md.

    Published 2016
    “…Asymmetrically, anomaly based detection method can detect novel attacks but it has high false positive rate. …”
    Get full text
    Get full text
    Conference or Workshop Item