Search Results - (( data detection based algorithm ) OR ( data visualization using algorithm ))
Search alternatives:
- data visualization »
- detection based »
- using algorithm »
- data detection »
-
1
Damage visualization based on frequency shift of single-mode ultrasound-guided wavefield
Published 2022“…Overall, the results show that frequency analysis can detect the damage four times faster and the algorithm uses two-dimensional calculation instead of conventional three-dimensional of VTWAM method.…”
Get full text
Get full text
Article -
2
Detection of head position using chain code algorithm
Published 2007“…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
Get full text
Get full text
Thesis -
3
Detection of head position using chain code algorithm
Published 2007“…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
Get full text
Get full text
Thesis -
4
Investigation Of Edge Detection Techniques Based On Brain Tumor Images
Published 2018“…The images undergo three fundamental steps of edge detection techniques. The edge detection operators used to detect the brain tumor are Robert zero-crossing, Sobel operator, Prewitt operator, Canny operator and modified Canny algorithm. …”
Get full text
Get full text
Monograph -
5
Wearable based-sensor fall detection system using machine learning algorithm
Published 2021“…In this project, a wearable sensor-based fall detection system using a machine-learning algorithm had been developed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
Enhancing data integrity in internet of things-based healthcare applications: A visualization approach for duplicate detection
Published 2025“…A Python-based visualization framework using Pandas and Matplotlib was developed to detect and represent duplicate records. …”
Get full text
Get full text
Get full text
Article -
7
Data mining based damage identification using imperialist competitive algorithm and artificial neural network
Published 2018“…In this study, to predict the damage severity of sin-gle-point damage scenarios of I-beam structures a data mining based damage identification framework and a hybrid algorithm combining Artificial Neural Network (ANN) and Imperial Competitive Algorithm (ICA), called ICA-ANN method, is proposed. …”
Get full text
Get full text
Article -
8
Using text mining algorithm to detect gender deception based on Malaysian chat room lingo / Dianne L. M. Cheong and Nur Atiqah Sia Abdullah @ Sia Sze Yieng
Published 2006“…Inference can be made both from writing style and from clues hidden in the posting data. A text-mining algorithm was designed to detect gender deception based on gender-preferential features at the word or clause level of Malaysian e-mail users. …”
Get full text
Get full text
Get full text
Article -
9
Using text mining algorithm to detect gender deception based on Malaysian chatroom lingo / Dianne L.M. Cheong and Nur Atiqah Sia Abdullah@Sia Sze Yieng
Published 2006“…Based on this designed text algorithm, a prototype in Visual Basic is developed. …”
Get full text
Get full text
Research Reports -
10
Enhancing data integrity in internet of things-based healthcare applications: a visualization approach for duplicate detection
Published 2025“…A Python-based visualization framework using Pandas and Matplotlib was developed to detect and represent duplicate records. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Gun detection system using Yolov3
Published 2019“…The objective of this paper is to visually detect the handgun in real time videos. The proposed method is using YOLO-V3 algorithm and comparing the number of false positive and false negative with Faster RCNN algorithm. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
Cabbage disease detection system using k-NN algorithm
Published 2022“…Finally, the KNN algorithm will be used to classify the disease based on sample nature and a cabbage disease data set. …”
Get full text
Get full text
Get full text
Academic Exercise -
13
A review of visualization techniques for duplicate detection in cancer datasets
Published 2025“…Studies were selected based on relevance to duplicate detection and visualization, excluding those centered on image or video data. …”
Get full text
Get full text
Get full text
Article -
14
Innovative algorithm for easing VIP's navigation by avoiding obstacles and finding safe routes
Published 2023Conference Paper -
15
Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory
Published 2011“…This automated generator will facilitate NPSF analysis as manual fault analysis is no longer practical due to increasing memory size. The algorithms used in this generator are based on March algorithm. …”
Get full text
Get full text
Thesis -
16
An enhanced sequential exception technique for semantic-based text anomaly detection
Published 2019“…The detection of semantic-based text anomaly is an interesting research area which has gained considerable attention from the data mining community. …”
Get full text
Get full text
Get full text
Thesis -
17
Fast shot boundary detection based on separable moments and support vector machine
Published 2021“…The large number of visual applications in multimedia sharing websites and social networks contribute to the increasing amounts of multimedia data in cyberspace. …”
Get full text
Get full text
Get full text
Article -
18
A Hybrid Artificial Intelligence Model for Detecting Keratoconus
Published 2023“…This paper proposes a new unsupervised model to detect KCN, based on adapted flower pollination algorithm (FPA) and the k-means algorithm. …”
Article -
19
Single-Trial Subspace-Based Approach for VEP Extraction
Published 2010“…With the simulated data, the algorithms are used to estimate the latencies of P100, P200, and P300 of VEP signals corrupted by additive colored noise at different values of SNR. …”
Get full text
Get full text
Get full text
Article -
20
Estimation of Visual Evoked Potentials for Measurement of Optical Pathway Conduction
Published 2009“…Later, the effectiveness and validity of the algorithm are evaluated using real patient data recorded in a clinical environment. …”
Get full text
Get full text
Conference or Workshop Item
