Search Results - (( data integration method algorithm ) OR ( data visualization using algorithm ))
Search alternatives:
- integration method »
- data visualization »
- data integration »
- method algorithm »
- using algorithm »
-
1
Enhancement Of Medical Image Compression Algorithm In Noisy WLANS Transmission
Published 2018“…For image reconstruction,decoding steps based the developed quantization architecture are examined.The EICA is particularly useful where the size of the transmitted data needs to be reduced to minimize the image transmission time.For data compression with suitable and effective performance,enhanced independent components analysis (EICA) is proposed as an algorithm for compression and decompression of medical data.A comparative analysis is performed based on existing data compression techniques:discrete cosine transform (DCT), set partitioning in hierarchical trees (SPIHT),and Joint Photographic Experts Group (JPEG 2000).Three main modules,namely,compression segment (CS),transceiver segment (TRS),and outcome segment (OTS) modules,are developed to realize a fully computerized simulation tool for medical data compression with suitable and effective performance.To compress medical data using algorithms,CS module involves four different approaches which are DCT, SPIHT,JPEG 2000 and EICA.TRS module is processed by low-cost WLANs with low-bandwidth transmission.Finally,OTS is used for data decompression and visualization result.In terms of compression module,results show the benefits of applying EICA in medical data compression and transmission.While for system design,the developed system displays favorable outcomes in compressing and transmitting medical data.In conclusion,all three modules (CS,TRS,and OTS) are integrated to yield a computerized prototype named as Medical Data Simulation System(Medata-SIM) computerized system that includes medical data compression and transceiver for visualization to aid medical practitioners in carrying out rapid diagnoses.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
-
3
Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique
Published 2018“…However, this method has the difficulty in selecting the suitable IMF for the next data post-processing method, which is Hilbert Transform (HT). …”
Get full text
Get full text
Thesis -
4
SENSORY EXPERT: DEVICE FOR SENSORY TEST
Published 2018“…In developing the algorithm for heat sensing, humidity and temperature sensor DHT 11 is used and the data of temperature is displayed in Blynk applications. …”
Get full text
Get full text
Final Year Project -
5
Development of Technical Safety Dashboard Using Microsoft Power BI Integration with R
Published 2020“…This algorithm has been used to forecast on the end date of projects. …”
Get full text
Get full text
Final Year Project -
6
Enhancing data integrity in internet of things-based healthcare applications: a visualization approach for duplicate detection
Published 2025“…However, scalability limitations were observed in larger datasets, where visual clarity declined. These findings highlight the value of visualization as a preliminary data quality assessment tool and suggest future integration with advanced detection algorithms to enhance robustness and scalability…”
Get full text
Get full text
Get full text
Get full text
Article -
7
Enhancing data integrity in internet of things-based healthcare applications: A visualization approach for duplicate detection
Published 2025“…However, scalability limitations were observed in larger datasets, where visual clarity declined. These findings highlight the value of visualization as a preliminary data quality assessment tool and suggest future integration with advanced detection algorithms to enhance robustness and scalability.…”
Get full text
Get full text
Get full text
Article -
8
Design and implementation of multimedia digital matrix system
Published 2005“…The hybrid-reset algorithm is successfully solved the most well known problem of channel synchronization in data oversampling method. …”
Get full text
Get full text
Conference or Workshop Item -
9
Sauvola Segmentation and Support Vector Machine-Salp Swarm Algorithm Approach for Identifying Nutrient Deficiencies in Citrus Reticulata Leaves
Published 2024“…The proposed method integrates colour and texture feature-based image analysis with machine learning algorithms for classification. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Development of a Spatiotemporal Data Model for Management and Visualization of Surface Movement Data
Published 2008“…In developing the visualization tool, visualization algorithm was used by employing the morphing technique which uses parametric equation. …”
Get full text
Get full text
Thesis -
11
Virtual reality in algorithm programming course: practicality and implications for college students
Published 2024“…The analysis of learning problems shows the unavailability of interactive learning media that can support various learning styles of students in programming algorithm materials. Therefore, this VR learning design integrates various elements of students' learning styles, including visual, audiovisual, kinesthetic, and reading. …”
Get full text
Get full text
Get full text
Article -
12
Subsea Pipeline Corrosion Estimation by Restoring and Enhancing Degraded Underwater Images
Published 2018“…The enhanced colours in the imaging data helps in corrosion estimation process. The image restoration and enhancement algorithm are tested on both experimentally collected as well as publicly available hazy underwater images. …”
Get full text
Get full text
Article -
13
Subsea Pipeline Corrosion Estimation by Restoring and Enhancing Degraded Underwater Images
Published 2018“…The enhanced colours in the imaging data helps in corrosion estimation process. The image restoration and enhancement algorithm are tested on both experimentally collected as well as publicly available hazy underwater images. …”
Get full text
Get full text
Article -
14
Enhancing project completion date prediction using a hybrid model: rule-based algorithm and machine learning algorithm
Published 2025“…The study employs a hybrid predictive model that combines Big Data technologies, Extract Load Transfer (ELT) processes, rule-based algorithms (RBA), machine learning (ML), and Power BI visualizations. …”
Get full text
Get full text
Get full text
Article -
15
Classification of labour pain using electroencephalogram signal based on wavelet method / Sai Chong Yeh
Published 2020“…The training and parameters selection of the machine learning algorithms are conducted using EEG data collected from ten subjects in the laboratory. …”
Get full text
Get full text
Get full text
Thesis -
16
Defects identification on semiconductor wafer for yield improvement using machine learning / Pedram Tabatabaeemoshiri
Published 2025“…The proposed methodology involves collecting wafer inspection data, extracting relevant features, and applying the GSSL algorithm to identify the hidden defects. …”
Get full text
Get full text
Get full text
Thesis -
17
A novel lip geometry approach for audio-visual speech recognition
Published 2014“…Finally, the performance of the new methods introduced in this work are evaluated using the CUAVE and LUNA-V data corpora under a range of different signal to noise ratio conditions using the NOISEX-92 dataset. …”
Get full text
Get full text
Thesis -
18
Exploring frogeye leaf spot disease severity in soybean through hyperspectral data analysis and machine learning with Orange Data Mining
Published 2025“…Materials and Methods: We used hyperspectral reflectance data from healthy and FLS of soybeans. …”
Get full text
Get full text
Get full text
Article -
19
An enhanced sequential exception technique for semantic-based text anomaly detection
Published 2019“…This study proposes an Enhanced Sequential Exception Technique (ESET) to detect semantic-based text anomaly by achieving five objectives: (1) to modify Sequential Exception Technique (SET) in processing unstructured text; (2) to optimize Cosine Similarity for identifying similar and dissimilar text data; (3) to hybridize modified SET with Latent Semantic Analysis (LSA); (4) to integrate Lesk and Selectional Preference algorithms for disambiguating senses and identifying text canonical form; and (5) to represent semantic-based text anomaly using First Order Logic (FOL) and Concept Network Graph (CNG). …”
Get full text
Get full text
Get full text
Thesis -
20
Machine learning application for concrete surface defects automatic damage classification
Published 2024“…This model is trained using 80% of the image data and tested using another 20% of the image data. …”
Get full text
Get full text
Get full text
Article
