Search Results - (( engine using optimization algorithm ) OR ( data visualization using algorithm ))

Refine Results
  1. 1

    Comparative Performance Analysis of Bat Algorithm and Bacterial Foraging Optimization Algorithm using Standard Benchmark Functions by Mazlina, Abdul Majid, Alsariera, Yazan A., Alamri, Hammoudeh S., Nasser, Abdullah M., Kamal Z., Zamli

    Published 2014
    “…Owing to the fact that they are new and much of their relative performance are still unknown (as compared to other established meta-heuristic algorithms), Bacterial Foraging Optimization Algorithm (BFO) and Bat Algorithm (BA) have been adopted for comparison using the 12 selected benchmark functions. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2
  3. 3
  4. 4

    Hardware Software Partitioning Using Particle Swarm Optimization (PSO) In Image Processing Application by Tan, Jia Zheng

    Published 2018
    “…Then the data will be processed in MATLAB using PSO algorithm to determine the optimal result in partitioning. …”
    Get full text
    Get full text
    Monograph
  5. 5

    A Time-Domain Subspace Technique for Estimating Visual Evoked Potential Latencies by Yusoff, Mohd Zuki, Kamel, Nidal

    Published 2010
    “…Additionally, the results of the real patient data confirm the superiority of GSA over TOC in estimating VEP's P100 latencies, which are used by clinicians to assess the conduction of electrical signals from the subjects' retinas to the visual cortex parts of their brains.…”
    Get full text
    Get full text
    Get full text
    Citation Index Journal
  6. 6
  7. 7
  8. 8

    Courier delivery services visualisor (CDSV) with an integration of genetic algorithm and A* engine by Jalaluddin, Mohammad Fariduddin, Kamaru-Zaman, Ezzatul Akmal, Abdul Rahman, Shuzlina, Mutalib, Sofianita

    Published 2017
    “…This study developed Courier Delivery Services Visualisor (CDSV) that is able to visualize the best route to be taken by distributor, so that the courier service can arrive on time.CDSV employed Genetic Algorithm (GA) and Astar Algorithm (A*) that integrates with Geographical Information System (GIS) data.A graphical user interface in the form of simulation map that suggests the best route and the optimal distance are displayed for easier courier service distribution references.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Evolutionary tuning of modular fuzzy controller for two-wheeled wheelchair by Ahmad, Salmiah, Siddique, Nazmul H., Tokhi, Mohammad Osman

    Published 2012
    “…Due to its signficant advantages over other searching methods, a genetic algorithm approach is used to optimize the scaling factors of the MFC and results show that the optimized parameters give better system performance for such a complex, highly nonlinear two-wheeled wheelchair system.…”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Edge assisted crime prediction and evaluation framework for machine learning algorithms by Adhikary, Apurba, Murad, Saydul Akbar, Munir, Md Shirajum, Choong Seon, Hong Seong

    Published 2022
    “…To anticipate occurrences, ML methods such as Decision Trees, Neural Networks, K-Nearest Neighbors, and Impact Learning are being utilized, and their performance is compared based on the data processing and modification used. A maximum accuracy of 81% is obtained for Decision Tree algorithm during the prediction of crime. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Classification of labour pain using electroencephalogram signal based on wavelet method / Sai Chong Yeh by Sai , Chong Yeh

    Published 2020
    “…These methods present a robust system that enables fully automated identification and removal of artifacts from EEG signals, without the need of visual inspection or arbitrary thresholding. The training and parameters selection of the machine learning algorithms are conducted using EEG data collected from ten subjects in the laboratory. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Detection of defect in concrete using elastic wave tomography reconstruction technique / Liu Kit Fook by Liu, Kit Fook

    Published 2017
    “…In this study, it was found that the travel time tomography was less sensitive than the amplitude tomography and frequency tomography in visualizing defect. However, with the use of Q-value as observed data in tomography reconstruction, visualization accuracy has improved substantially. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Defects identification on semiconductor wafer for yield improvement using machine learning / Pedram Tabatabaeemoshiri by Pedram , Tabatabaeemoshiri

    Published 2025
    “…This work presents a novel graph-based semi-supervised learning (GSSL) algorithm designed for wafer defect detection. The proposed methodology involves collecting wafer inspection data, extracting relevant features, and applying the GSSL algorithm to identify the hidden defects. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    The formulation of a transfer learning pipeline for the classification of the wafer defects by Lim, Shi Xuen

    Published 2023
    “…Automated processes have been used commonly in recent years, with the judgement done by using conventional image processing algorithm. …”
    Get full text
    Get full text
    Thesis
  15. 15

    A Subspace Approach for Extracting Signals Highly Corrupted by Colored Noise by Yusoff, Mohd Zuki, Hussin, Fawnizu Azmadi

    Published 2010
    “…Moreover, the results of the real patient data confirm the superiority of SSA2 over SSA1 in estimating VEP's P100 latencies, which are used by doctors to assess the conduction of electrical signals from the subjects' retinas to the visual cortex parts of their brains.…”
    Get full text
    Get full text
    Get full text
    Citation Index Journal
  16. 16

    Intelligent image noise types recognition and denoising system using deep learning / Khaw Hui Ying by Khaw , Hui Ying

    Published 2019
    “…In order to reduce the training time and computational cost of the algorithm, Principal Components Analysis (PCA) pretraining strategy is deployed to obtain data adaptive filter banks. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Enhanced emotion recognition in videos: a convolutional neural network strategy for human facial expression detection and classification by Ashraf, Arselan, Gunawan, Teddy Surya, Arifin, Fatchul, Kartiwi, Mira, Sophian, Ali, Habaebi, Mohamed Hadi

    Published 2023
    “…Despite extensive research employing machine learning algorithms like convolutional neural networks (CNN), challenges remain concerning input data processing, emotion classification scope, data size, optimal CNN configurations, and performance evaluation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Development Of Vehicle Tracking And Counting System From Traffic Surveillance Video by Kueh , Chiung Lin

    Published 2015
    “…Simple tracking and counting algorithm is used to track and count the detected vehicle. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Development of IoT-based automated dynamic emergency response system against fire incidents in academic building by Al-Hady, Syed Mohammed Zakaria, Islam, Md Rafiqul, Rashid, Muhammad Mahbubur

    Published 2023
    “…The proposed system leverages IoT technology, wireless and bluetooth sensor networks to gather real-time data from various sensors and devices installed in the site and uses machine learning algorithms to predict and prevent potential fire incidents. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Hierarchical extreme learning machine based reinforcement learning for goal localization by AlDahoul, Nouar, Htike, Zaw Zaw, Akmeliawati, Rini

    Published 2017
    “…In this paper, reinforcement learning (RL) method was utilized to find optimal series of actions to localize the goal region. The visual data, a set of images, is high dimensional unstructured data and needs to be represented efficiently to get a robust detector. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper