Search Results - (( basic detection based algorithm ) OR ( data visualisation using algorithm ))
Search alternatives:
- visualisation using »
- data visualisation »
- basic detection »
- detection based »
- using algorithm »
-
1
Multi-dimensional Data Visualisation using Mobile Augmented Reality
Published 2020“…Therefore, this algorithm uses AR to provide a multi-display solution for improved data visualisation after processing, summarising and classifying data. …”
Get full text
Get full text
Get full text
Article -
2
Effectiveness of silhouette rendering algorithms in terrain visualisation
Published 2002“…Silhouette Rendering Algorithms have been successfully used in various applications such as communicating shape and cartoon rendering.This paper explores how effective silhouette rendering algorithms could be used in terrain visualisation. …”
Get full text
Get full text
Conference or Workshop Item -
3
Visualisation System of COVID-19 Data in Malaysia
Published 2021“…This study aims to provide a system, using COVID-19 data as a sample to visualise and analyse cases, deaths, discharged ICU cases updates in Malaysia as a whole state wise of COVID-19 daily statistics. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
3D terrain visualisation for GIS: A comparison of different techniques
Published 2011“…The results of this paper will be of help to the users in identifying the best technique of terrain visualisation suitable for GIS data.…”
Get full text
Get full text
Book Section -
5
Visualisation System of COVID-19 Data in Malaysia
Published 2021“…This study aims to provide a system, using COVID-19 data as a sample to visualise and analyse cases, deaths, discharged ICU cases updates in Malaysia as a whole state wise of COVID-19 daily statistics. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
A COMPARISON STUDY OF DATA CLUSTERING AND VISUALISATION TECHNIQUES WITH VARIOUS DATA TYPES
Published 2020“…Clustering is used to identify the intrinsic grouping of a set of unlabelled data. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
7
-
8
The effect of different distance measures in detecting outliers using clustering-based algorithm for circular regression model
Published 2017“…In this study, we proposed multiple outliers detection in circular regression models based on the clustering algorithm. …”
Get full text
Get full text
Get full text
Article -
9
Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
Published 2019Get full text
Get full text
Conference or Workshop Item -
10
Shot boundary detection based on orthogonal polynomial
Published 2019“…SBD is the process of automatically partitioning video into its basic units, known as shots, through detecting transitions between shots. …”
Get full text
Get full text
Get full text
Article -
11
Boundary extraction and corner point detection for map of kariah Kg. Bukit Kapar / 'Afina AmirHussin
Published 2019“…Boundary extraction and corner point detection are basic step for many image processing applications including image enhancement, object detection and pattern recognition. …”
Get full text
Get full text
Thesis -
12
A case study : 2D Vs 3D parallel differential equation toward tumor cell detection on multi-core parallel computing atmosphere
Published 2010“…In order to detect tumour cells, 2D and 3D Partial Differential Equations (PDE) are considered and compared by using Multi-Core parallel computing atmosphere with visualisation, communication and data analysis. …”
Get full text
Get full text
Get full text
Article -
13
A comparative analysis of image copy-move forgery detection algorithms based on hand and machine-crafted features
Published 2023“…IC-MFD algorithms based hand-crafted features are the algorithms that detect the faked image depending on manual feature extraction while IC-MFD algorithms based machine-crafted features are the algorithms that detect the faked image automatically from image. …”
Article -
14
Development of computer aided three-dimensional geometric modeler based on designer's idea in twodimensional
Published 2006“…In the first phase, two algorithms were proposed. The first is enhanced thinning algorithm that is used to thin the sketch while maintaining its topology and basic shape. …”
Get full text
Get full text
Monograph -
15
A detector generating algorithm for intrusion detection inspired by artificial immune system
Published 2015“…Artificial immune system (AIS) allows us to inspire several ideas for the design of computer intrusion detection.The standard of negative selection algorithm (NSA), offered by Stephanie Forrest in 1994, is one of the most common mechanisms in AIS that applied in anomaly detection for the similarity of its basic idea. …”
Get full text
Get full text
Get full text
Article -
16
Dynamic modeling by usage data for personalization systems
Published 2009Get full text
Get full text
Conference or Workshop Item -
17
Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant
Published 2007“…Another structure of MLP trained using backpropagation algorithm is used to detect and locate the base of the young corn tree using the skeleton of the segmented image. …”
Get full text
Get full text
Thesis -
18
Using text mining algorithm to detect gender deception based on Malaysian chatroom lingo / Dianne L.M. Cheong and Nur Atiqah Sia Abdullah@Sia Sze Yieng
Published 2006“…Based on this designed text algorithm, a prototype in Visual Basic is developed. …”
Get full text
Get full text
Research Reports -
19
PREDICTION OF HFMD DISEASE OUTBREAK FROM TWITTER
Published 2019“…This is because both Naive Bayes and SVM are baseline algorithm used in text classification. In the end, a visualisation of HFMD Disease Map is presented to visualize the city that suffer HFMD outbreak using geo-located tweet that related with HFMD. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
20
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011Get full text
Get full text
Undergraduates Project Papers
