Search Results - (( data detection method algorithm ) OR ( data visualization based algorithm ))

Refine Results
  1. 1

    Detection of head position using chain code algorithm by Fuad, Norfaiza

    Published 2007
    “…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Detection of head position using chain code algorithm by Fuad, Norfaiza

    Published 2007
    “…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Damage visualization based on frequency shift of single-mode ultrasound-guided wavefield by Shahrim, Muhamad Azim, Harmin, Mohammad Yazdi, Romli, Fairuz Izzuddin, Chia, Chen Ciang, Jung-Ryul, Lee

    Published 2022
    “…Ultrasonic wavefield inspection has been available for a while and it is a great method for damage detection. However, the challenge lies in the complexity of the algorithm for mode isolation. …”
    Get full text
    Get full text
    Article
  4. 4

    Enhancing data integrity in internet of things-based healthcare applications: A visualization approach for duplicate detection by Emran, Nurul Akmar, Md Isa, Siti NoorBasirah, Harum, Norharyati, Machap, Logenthiran, Nordin, Azlin

    Published 2025
    “…However, scalability limitations were observed in larger datasets, where visual clarity declined. These findings highlight the value of visualization as a preliminary data quality assessment tool and suggest future integration with advanced detection algorithms to enhance robustness and scalability.…”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Data mining based damage identification using imperialist competitive algorithm and artificial neural network by Gordan, Meisam, Razak, Hashim Abdul, Ismail, Zubaidah, Ghaedi, Khaled

    Published 2018
    “…In this study, to predict the damage severity of sin-gle-point damage scenarios of I-beam structures a data mining based damage identification framework and a hybrid algorithm combining Artificial Neural Network (ANN) and Imperial Competitive Algorithm (ICA), called ICA-ANN method, is proposed. …”
    Get full text
    Get full text
    Article
  6. 6

    Cabbage disease detection system using k-NN algorithm by Mohamad Ainuddin Sahimat

    Published 2022
    “…Finally, the KNN algorithm will be used to classify the disease based on sample nature and a cabbage disease data set. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  7. 7

    Enhancing data integrity in internet of things-based healthcare applications: a visualization approach for duplicate detection by Md Isa, Siti Noor Basirah, Emran, Nurul Akmar, Harum, Norharyati, Logenthiran, Machap, Nordin, Azlin

    Published 2025
    “…However, scalability limitations were observed in larger datasets, where visual clarity declined. These findings highlight the value of visualization as a preliminary data quality assessment tool and suggest future integration with advanced detection algorithms to enhance robustness and scalability…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Gun detection system using Yolov3 by Warsi, Arif, Abdullah, Munaisyah, Husen, Mohd Nizam, Yahya, Muhammad, Khan, Sheroz, Jawaid, Nasreen

    Published 2019
    “…The objective of this paper is to visually detect the handgun in real time videos. The proposed method is using YOLO-V3 algorithm and comparing the number of false positive and false negative with Faster RCNN algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  9. 9

    Fast shot boundary detection based on separable moments and support vector machine by Idan, Zinah N., Abdulhussain, Sadiq H., Mahmmod, Basheera M., Al-Utaibi, Khaled A., Syed Abdul Rahman Al-, Syed Abdul Rahman Al-Hadad, Sait, Sadiq M.

    Published 2021
    “…The large number of visual applications in multimedia sharing websites and social networks contribute to the increasing amounts of multimedia data in cyberspace. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    An enhanced sequential exception technique for semantic-based text anomaly detection by Taiye, Mohammed Ahmed

    Published 2019
    “…The detection of semantic-based text anomaly is an interesting research area which has gained considerable attention from the data mining community. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Improved self-organizing map clustering of power transformer dissolved gas analysis using inputs pre-processing by Misbahulmunir S., Ramachandaramurthy V.K., Thayoob Y.H.M.D.

    Published 2023
    “…Clustering algorithms; Conformal mapping; Data visualization; Power transformers; Self organizing maps; Support vector machines; Data normalization methods; Detection sensitivity; Dissolved gas analyses (DGA); Dissolved gas analysis; High dimensional data; Incipient fault detection; Interpretation methods; Topological relations; Fault detection…”
    Article
  13. 13

    A Hybrid Artificial Intelligence Model for Detecting Keratoconus by Alyasseri Z.A.A., Al-Timemy A.H., Abasi A.K., Lavric A., Mohammed H.J., Takahashi H., Milhomens Filho J.A., Campos M., Hazarbassanov R.M., Yousefi S.

    Published 2023
    “…This paper proposes a new unsupervised model to detect KCN, based on adapted flower pollination algorithm (FPA) and the k-means algorithm. …”
    Article
  14. 14

    Subspace Techniques for Brain Signal Enhancement by Kamel , Nidal, Yusoff, Mohd Zuki

    Published 2009
    “…Next, the validity and the effectiveness of the algorithms to detect the P100's (used in objective assessment of visual pathways) are evaluated using real patient data collected from a hospital. …”
    Get full text
    Get full text
    Book Section
  15. 15

    A Time-Domain Subspace Technique for Estimating Visual Evoked Potential Latencies by Yusoff, Mohd Zuki, Kamel, Nidal

    Published 2010
    “…Further, GSA has been compared with a third-order correlation (TOC) method, using both realistic simulation and real patient data gathered in a hospital. …”
    Get full text
    Get full text
    Get full text
    Citation Index Journal
  16. 16

    Defects identification on semiconductor wafer for yield improvement using machine learning / Pedram Tabatabaeemoshiri by Pedram , Tabatabaeemoshiri

    Published 2025
    “…This work presents a novel graph-based semi-supervised learning (GSSL) algorithm designed for wafer defect detection. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique by Muhammad Hanafi, Yusop

    Published 2018
    “…However, this method has the difficulty in selecting the suitable IMF for the next data post-processing method, which is Hilbert Transform (HT). …”
    Get full text
    Get full text
    Thesis
  18. 18

    Sauvola Segmentation and Support Vector Machine-Salp Swarm Algorithm Approach for Identifying Nutrient Deficiencies in Citrus Reticulata Leaves by Lia, Kamelia

    Published 2024
    “…The proposed method integrates colour and texture feature-based image analysis with machine learning algorithms for classification. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Human presence detection system by Tai, Xi Yang

    Published 2024
    “…The system architecture includes microwave sensors for improved accuracy and reliability, ESP32 microcontrollers for data processing, and cloud-based platforms such as AWS IoT Core, Timestream, and Grafana for data storage and visualization. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis