Search Results - (( developing function methods algorithm ) OR ( data visualization _ algorithm ))
Search alternatives:
- developing function »
- data visualization »
- methods algorithm »
- function methods »
-
1
Parallel Implementation Of Field Visualizations With High Order Tetrahedral Finite Elements
Published 2013“…The method builds upon an approach of the open source visualization software VTK where the data visualizer program ParaView is freely available. …”
Get full text
Get full text
Thesis -
2
Development of obstable avoidance system for 3D robot navigation
Published 2024“…In conclusion, the developed algorithm enables the robot to detect obstacles that are not on the same plane as the 2D LiDAR and cannot be detected using depth camera data.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
Decoding of visual activity patterns from fMRI responses using multivariate pattern analyses and convolutional neural network
Published 2017“…MVPA-CNN based proposed algorithm is compared with region of interest (ROI) based method and MVPA based estimated values. …”
Get full text
Get full text
Article -
4
E-Raser: file shredder application with content replacement by using random words function
Published 2018“…Thus, this study proposed a file shredding application named E-Raser which replacing the content of the file using random words function algorithm. A file shredder application named E-Raser was developed to shred Microsoft Word documents with (.doc) or (.docx) format. …”
Get full text
Get full text
Get full text
Article -
5
Development of Machine Learning Algorithm for Acquiring Machining Data in Turning Process
Published 2004“…The design network is trained by presenting several target machining data that the network must learn according to a learning rule (algorithm). …”
Get full text
Get full text
Thesis -
6
Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli
Published 2021“…The main goal of this study is to create an online food ordering app using the corresponding Boyer-Moore string matching algorithm. The application evaluation process is carried out by the developer's functionality test to ensure that there are no unnecessary issues in this app, especially in the main feature. …”
Get full text
Get full text
Thesis -
7
Design and implementation of multimedia digital matrix system
Published 2005“…The hybrid-reset algorithm is successfully solved the most well known problem of channel synchronization in data oversampling method. …”
Get full text
Get full text
Conference or Workshop Item -
8
Clustering autism spectrum disorder student’s system based on intelligence, skills and behavior using agglomerative clustering algortihm / Daarin Nadia Nordin
Published 2020“…Data cleaning and data transformation is first carried out, followed by normalization through the Z-score method before being processed in the clustering model. …”
Get full text
Get full text
Thesis -
9
Segmentation of Magnetic Resonance Brain Images Using Watershed Algorithm
Published 2004“…The proposed technique based on the watershed algorithm, which is applied to the gradient magnitude of the MRI data. …”
Get full text
Get full text
Thesis -
10
Removal of BCG artefact from concurrent fMRI-EEG recordings based on EMD and PCA
Published 2017“…Methods We developed a hybrid algorithm that combines features of empirical mode decomposition (EMD) with principal component analysis (PCA) to reduce the BCG artefact. …”
Get full text
Get full text
Article -
11
Initialization procedure in solving Optimal Power Flow (OPF) using Artificial Immune System (AIS) optimization technique / Aimi Idzwan Tajudin
Published 2007“…The programmed that has been used in this project is MATLAB, which provides a high level computing language and interactive environment for algorithm development, data visualization, data analysis and numerical analysis. …”
Get full text
Get full text
Thesis -
12
Craniofacial surgery simulation using volumetric object representations
Published 2006“…The surfaces of soft tissue and hard tissue have been extracted from CT data using Marching Cubes algorithm and are rendered with surface based methods. …”
Get full text
Get full text
Conference or Workshop Item -
13
Feature extraction and localisation using scale-invariant feature transform on 2.5D image
Published 2015“…Hence, we aim to develop methods to automate as much as possible the process of landmarking facial features. …”
Get full text
Get full text
Get full text
Article -
14
-
15
Identifying suicidal ideation through twitter sentiment analysis using Naïve Bayes / Annasuha Atie Atirah Alias
Published 2023“…Thus, this project aims to design, develop, and evaluate web-based application utilizing sentiment analysis, specifically employing the Naïve Bayes algorithm, to identify and analyze suicidal ideation within Twitter posts. …”
Get full text
Get full text
Thesis -
16
Study of hand gesture recognition using impulse radio ultra wideband (IRUWB) radar sensor
Published 2023“…The developed algorithms interpret raw IR-UWB radar sensor data and associate it with specific hand gestures, addressing the core objective of gesture recognition. …”
Get full text
Get full text
Get full text
Thesis -
17
Smartphone based wound shape measurement / Muhammad Azlan Othman
Published 2016“…This application can be improved its accuracy by implement a better segmentation method and algorithm.…”
Get full text
Get full text
Thesis -
18
Application of target detection method based on convolutional neural network in sustainable outdoor education
Published 2023“…The model can recognize underwater organisms local, global, and visual features. Different recognition methods have certain advantages in accuracy, speed, and other aspects. …”
Get full text
Get full text
Article -
19
Tacit knowledge for business intelligence framework using cognitive-based approach
Published 2022“…The approach is based on the theory of systematic functional linguistics, developed into interview protocols to be asked to tacit knowledge owners. …”
Get full text
Get full text
Thesis -
20
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…This research was undertaken to develop methods to mitigate shoulder-surfing attack. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis
