Search Results - (( data integration based algorithm ) OR ( data visualization using algorithm ))
Search alternatives:
- data visualization »
- integration based »
- data integration »
- using algorithm »
-
1
HAPTIC VISUALIZATION USING VISUAL TEXTURE INFORMATION
Published 2011“…The design of the proposed framework involves haptic texture rendering algorithm and query algorithm. The proposed framework integrates computer haptic and content based image retrieval (CBIR) where haptic texture rendering is performed based on extracted cloth data. …”
Get full text
Get full text
Thesis -
2
An efficient real-time terrain data organization and visualization algorithm based on enhanced triangle-based level of detail technique
Published 2006“…Based upon the current offthe- shelf hardware capability, it is impossible to process the amount of data using the conventional approach. …”
Get full text
Get full text
Thesis -
3
Enhancement Of Medical Image Compression Algorithm In Noisy WLANS Transmission
Published 2018“…For image reconstruction,decoding steps based the developed quantization architecture are examined.The EICA is particularly useful where the size of the transmitted data needs to be reduced to minimize the image transmission time.For data compression with suitable and effective performance,enhanced independent components analysis (EICA) is proposed as an algorithm for compression and decompression of medical data.A comparative analysis is performed based on existing data compression techniques:discrete cosine transform (DCT), set partitioning in hierarchical trees (SPIHT),and Joint Photographic Experts Group (JPEG 2000).Three main modules,namely,compression segment (CS),transceiver segment (TRS),and outcome segment (OTS) modules,are developed to realize a fully computerized simulation tool for medical data compression with suitable and effective performance.To compress medical data using algorithms,CS module involves four different approaches which are DCT, SPIHT,JPEG 2000 and EICA.TRS module is processed by low-cost WLANs with low-bandwidth transmission.Finally,OTS is used for data decompression and visualization result.In terms of compression module,results show the benefits of applying EICA in medical data compression and transmission.While for system design,the developed system displays favorable outcomes in compressing and transmitting medical data.In conclusion,all three modules (CS,TRS,and OTS) are integrated to yield a computerized prototype named as Medical Data Simulation System(Medata-SIM) computerized system that includes medical data compression and transceiver for visualization to aid medical practitioners in carrying out rapid diagnoses.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Automated data process in participatory sensing using QR-code and EAN-13 barcode
Published 2018“…The enhanced algorithm was evaluated using a developed prototype which is an Android mobile application of a crowdsourcing data submission based on product price and information, WE+Price, in which, the algorithm was embedded. …”
Get full text
Get full text
Thesis -
5
Restaurant review system with data visualization and text search using TF-IDF algorithm / Syazwina Abd Hamid
Published 2020“…Hence, this project focuses on the integration of information retrieval with data visualization in order to produce valuable insights. …”
Get full text
Get full text
Thesis -
6
Enhancing data integrity in internet of things-based healthcare applications: a visualization approach for duplicate detection
Published 2025“…However, scalability limitations were observed in larger datasets, where visual clarity declined. These findings highlight the value of visualization as a preliminary data quality assessment tool and suggest future integration with advanced detection algorithms to enhance robustness and scalability…”
Get full text
Get full text
Get full text
Get full text
Article -
7
Enhancing data integrity in internet of things-based healthcare applications: A visualization approach for duplicate detection
Published 2025“…However, scalability limitations were observed in larger datasets, where visual clarity declined. These findings highlight the value of visualization as a preliminary data quality assessment tool and suggest future integration with advanced detection algorithms to enhance robustness and scalability.…”
Get full text
Get full text
Get full text
Article -
8
-
9
Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique
Published 2018“…The current research presents the implementation of an integrated kurtosisbased algorithm for a z-filter technique (Ikaz) to kurtosis ratio (Ikaz-kurtosis), for this allows automatic selection of the IMF that should be used. …”
Get full text
Get full text
Thesis -
10
A review of visualization techniques for duplicate detection in cancer datasets
Published 2025“…Studies were selected based on relevance to duplicate detection and visualization, excluding those centered on image or video data. …”
Get full text
Get full text
Get full text
Article -
11
Enhancing project completion date prediction using a hybrid model: rule-based algorithm and machine learning algorithm
Published 2025“…The study employs a hybrid predictive model that combines Big Data technologies, Extract Load Transfer (ELT) processes, rule-based algorithms (RBA), machine learning (ML), and Power BI visualizations. …”
Get full text
Get full text
Get full text
Article -
12
Development of a Spatiotemporal Data Model for Management and Visualization of Surface Movement Data
Published 2008“…In developing the visualization tool, visualization algorithm was used by employing the morphing technique which uses parametric equation. …”
Get full text
Get full text
Thesis -
13
The implementation of post-processing data thinning for multibeam echo sounding data
Published 2006“…Comparisons on the final results based on these three algorithms will be discussed in order to decide which algorithm is most favorable to be used in post-processing data thinning for cleaned MBES dataset. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Augmented reality monitoring system for cross-belt conveyor in advanced automation line / Sukarnur Che Abdullah ... [et al.]
Published 2025“…This motivates our initiative to develop a simulation of a cross-belt conveyor system. The algorithms for the conveyor system were implemented using C# within Visual Studio and Unity environments. …”
Get full text
Get full text
Get full text
Article -
15
Virtual reality in algorithm programming course: practicality and implications for college students
Published 2024“…The analysis of learning problems shows the unavailability of interactive learning media that can support various learning styles of students in programming algorithm materials. Therefore, this VR learning design integrates various elements of students' learning styles, including visual, audiovisual, kinesthetic, and reading. …”
Get full text
Get full text
Get full text
Article -
16
Subsea Pipeline Corrosion Estimation by Restoring and Enhancing Degraded Underwater Images
Published 2018“…The enhanced colours in the imaging data helps in corrosion estimation process. The image restoration and enhancement algorithm are tested on both experimentally collected as well as publicly available hazy underwater images. …”
Get full text
Get full text
Article -
17
Subsea Pipeline Corrosion Estimation by Restoring and Enhancing Degraded Underwater Images
Published 2018“…The enhanced colours in the imaging data helps in corrosion estimation process. The image restoration and enhancement algorithm are tested on both experimentally collected as well as publicly available hazy underwater images. …”
Get full text
Get full text
Article -
18
An enhanced sequential exception technique for semantic-based text anomaly detection
Published 2019“…If these challenges are not properly resolved, identifying semantic-based text anomaly will be less accurate. This study proposes an Enhanced Sequential Exception Technique (ESET) to detect semantic-based text anomaly by achieving five objectives: (1) to modify Sequential Exception Technique (SET) in processing unstructured text; (2) to optimize Cosine Similarity for identifying similar and dissimilar text data; (3) to hybridize modified SET with Latent Semantic Analysis (LSA); (4) to integrate Lesk and Selectional Preference algorithms for disambiguating senses and identifying text canonical form; and (5) to represent semantic-based text anomaly using First Order Logic (FOL) and Concept Network Graph (CNG). …”
Get full text
Get full text
Get full text
Thesis -
19
Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory
Published 2011“…This automated generator will facilitate NPSF analysis as manual fault analysis is no longer practical due to increasing memory size. The algorithms used in this generator are based on March algorithm. …”
Get full text
Get full text
Thesis -
20
Sauvola Segmentation and Support Vector Machine-Salp Swarm Algorithm Approach for Identifying Nutrient Deficiencies in Citrus Reticulata Leaves
Published 2024“…The proposed method integrates colour and texture feature-based image analysis with machine learning algorithms for classification. …”
Get full text
Get full text
Get full text
Get full text
Thesis
