Search Results - (( data integration method algorithm ) OR ( _ visualization using algorithm ))
Search alternatives:
- integration method »
- data integration »
- method algorithm »
- using algorithm »
-
1
Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique
Published 2018“…The current research presents the implementation of an integrated kurtosisbased algorithm for a z-filter technique (Ikaz) to kurtosis ratio (Ikaz-kurtosis), for this allows automatic selection of the IMF that should be used. …”
Get full text
Get full text
Thesis -
2
Sauvola Segmentation and Support Vector Machine-Salp Swarm Algorithm Approach for Identifying Nutrient Deficiencies in Citrus Reticulata Leaves
Published 2024“…The proposed method integrates colour and texture feature-based image analysis with machine learning algorithms for classification. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
-
4
Enhancement Of Medical Image Compression Algorithm In Noisy WLANS Transmission
Published 2018“…For image reconstruction,decoding steps based the developed quantization architecture are examined.The EICA is particularly useful where the size of the transmitted data needs to be reduced to minimize the image transmission time.For data compression with suitable and effective performance,enhanced independent components analysis (EICA) is proposed as an algorithm for compression and decompression of medical data.A comparative analysis is performed based on existing data compression techniques:discrete cosine transform (DCT), set partitioning in hierarchical trees (SPIHT),and Joint Photographic Experts Group (JPEG 2000).Three main modules,namely,compression segment (CS),transceiver segment (TRS),and outcome segment (OTS) modules,are developed to realize a fully computerized simulation tool for medical data compression with suitable and effective performance.To compress medical data using algorithms,CS module involves four different approaches which are DCT, SPIHT,JPEG 2000 and EICA.TRS module is processed by low-cost WLANs with low-bandwidth transmission.Finally,OTS is used for data decompression and visualization result.In terms of compression module,results show the benefits of applying EICA in medical data compression and transmission.While for system design,the developed system displays favorable outcomes in compressing and transmitting medical data.In conclusion,all three modules (CS,TRS,and OTS) are integrated to yield a computerized prototype named as Medical Data Simulation System(Medata-SIM) computerized system that includes medical data compression and transceiver for visualization to aid medical practitioners in carrying out rapid diagnoses.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
SENSORY EXPERT: DEVICE FOR SENSORY TEST
Published 2018“…In developing the algorithm for heat sensing, humidity and temperature sensor DHT 11 is used and the data of temperature is displayed in Blynk applications. …”
Get full text
Get full text
Final Year Project -
6
Development of Technical Safety Dashboard Using Microsoft Power BI Integration with R
Published 2020“…This algorithm has been used to forecast on the end date of projects. …”
Get full text
Get full text
Final Year Project -
7
Virtual reality in algorithm programming course: practicality and implications for college students
Published 2024“…The analysis of learning problems shows the unavailability of interactive learning media that can support various learning styles of students in programming algorithm materials. Therefore, this VR learning design integrates various elements of students' learning styles, including visual, audiovisual, kinesthetic, and reading. …”
Get full text
Get full text
Get full text
Article -
8
Subsea Pipeline Corrosion Estimation by Restoring and Enhancing Degraded Underwater Images
Published 2018“…The qualitative and quantitative analyses show promising results that encourages to integrate the proposed method into a robotic system that can be used for real time underwater pipeline corrosion inspection activity. …”
Get full text
Get full text
Article -
9
Subsea Pipeline Corrosion Estimation by Restoring and Enhancing Degraded Underwater Images
Published 2018“…The qualitative and quantitative analyses show promising results that encourages to integrate the proposed method into a robotic system that can be used for real time underwater pipeline corrosion inspection activity. …”
Get full text
Get full text
Article -
10
Enhancing data integrity in internet of things-based healthcare applications: a visualization approach for duplicate detection
Published 2025“…However, scalability limitations were observed in larger datasets, where visual clarity declined. These findings highlight the value of visualization as a preliminary data quality assessment tool and suggest future integration with advanced detection algorithms to enhance robustness and scalability…”
Get full text
Get full text
Get full text
Get full text
Article -
11
Enhancing data integrity in internet of things-based healthcare applications: A visualization approach for duplicate detection
Published 2025“…However, scalability limitations were observed in larger datasets, where visual clarity declined. These findings highlight the value of visualization as a preliminary data quality assessment tool and suggest future integration with advanced detection algorithms to enhance robustness and scalability.…”
Get full text
Get full text
Get full text
Article -
12
Design and implementation of multimedia digital matrix system
Published 2005“…The hybrid-reset algorithm is successfully solved the most well known problem of channel synchronization in data oversampling method. …”
Get full text
Get full text
Conference or Workshop Item -
13
Enhancing project completion date prediction using a hybrid model: rule-based algorithm and machine learning algorithm
Published 2025“…The study employs a hybrid predictive model that combines Big Data technologies, Extract Load Transfer (ELT) processes, rule-based algorithms (RBA), machine learning (ML), and Power BI visualizations. …”
Get full text
Get full text
Get full text
Article -
14
Classification of labour pain using electroencephalogram signal based on wavelet method / Sai Chong Yeh
Published 2020“…The training and parameters selection of the machine learning algorithms are conducted using EEG data collected from ten subjects in the laboratory. …”
Get full text
Get full text
Get full text
Thesis -
15
Development of a Spatiotemporal Data Model for Management and Visualization of Surface Movement Data
Published 2008“…In developing the visualization tool, visualization algorithm was used by employing the morphing technique which uses parametric equation. …”
Get full text
Get full text
Thesis -
16
A novel lip geometry approach for audio-visual speech recognition
Published 2014“…First, this work presents a new method to extract lip geometry features using the combination ofa skin colour filter, a border following algorithm and a convex hull approach. …”
Get full text
Get full text
Thesis -
17
Defects identification on semiconductor wafer for yield improvement using machine learning / Pedram Tabatabaeemoshiri
Published 2025“…The proposed methodology involves collecting wafer inspection data, extracting relevant features, and applying the GSSL algorithm to identify the hidden defects. …”
Get full text
Get full text
Get full text
Thesis -
18
Pipeline Corrosion Prediction Due To Naphthenic Acid Using Auto Regressive Integrated Moving Average Method (Arima)
Published 2019“…Artificial Neural Network (ANN) and ARIMA model is used as algorithm for development of prediction model. …”
Get full text
Get full text
Final Year Project -
19
A Salient Based Bag of Visual Word model (SBBoVW): improvements toward difficult object recognition and object location in image retrieval
Published 2016“…This method integrates SIFT features of the original and salient parts of pictures and fuses them together to generate better codebooks using bag of visual word method. …”
Get full text
Get full text
Get full text
Article -
20
An enhanced sequential exception technique for semantic-based text anomaly detection
Published 2019“…ESET performs text anomaly detection by employing optimized Cosine Similarity, hybridizing LSA with modified SET, and integrating it with Word Sense Disambiguation algorithms specifically Lesk and Selectional Preference. …”
Get full text
Get full text
Get full text
Thesis
