Search Results - (( its application method algorithm ) OR ( data visualization using algorithm ))
Search alternatives:
- data visualization »
- method algorithm »
- its application »
- using algorithm »
-
1
Development of obstable avoidance system for 3D robot navigation
Published 2024“…In conclusion, the developed algorithm enables the robot to detect obstacles that are not on the same plane as the 2D LiDAR and cannot be detected using depth camera data.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
A Time-Domain Subspace Technique for Estimating Visual Evoked Potential Latencies
Published 2010“…Additionally, the results of the real patient data confirm the superiority of GSA over TOC in estimating VEP's P100 latencies, which are used by clinicians to assess the conduction of electrical signals from the subjects' retinas to the visual cortex parts of their brains.…”
Get full text
Get full text
Get full text
Citation Index Journal -
3
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
Published 2023“…This paper aims to help select the best technique that suits its rightful purpose. It has been found that PCA, DOBIN, Stray algorithm, and DAE-KNN have a high learning rate compared to Random projection, ROBEM, and OCP methods. …”
Get full text
Get full text
Article -
4
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
“…This paper aims to help select the best technique that suits its rightful purpose. It has been found that PCA, DOBIN, Stray algorithm, and DAE-KNN have a high learning rate compared to Random projection, ROBEM, and OCP methods. …”
Get full text
Get full text
Article -
5
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
Published 2023“…This paper aims to help select the best technique that suits its rightful purpose. It has been found that PCA, DOBIN, Stray algorithm, and DAE-KNN have a high learning rate compared to Random projection, ROBEM, and OCP methods. …”
Get full text
Get full text
Article -
6
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
Published 2023“…This paper aims to help select the best technique that suits its rightful purpose. It has been found that PCA, DOBIN, Stray algorithm, and DAE-KNN have a high learning rate compared to Random projection, ROBEM, and OCP methods. …”
Get full text
Get full text
Article -
7
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
Published 2023“…This paper aims to help select the best technique that suits its rightful purpose. It has been found that PCA, DOBIN, Stray algorithm, and DAE-KNN have a high learning rate compared to Random projection, ROBEM, and OCP methods. …”
Get full text
Get full text
Article -
8
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
Published 2023“…This paper aims to help select the best technique that suits its rightful purpose. It has been found that PCA, DOBIN, Stray algorithm, and DAE-KNN have a high learning rate compared to Random projection, ROBEM, and OCP methods. …”
Get full text
Get full text
Article -
9
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
Published 2023“…This paper aims to help select the best technique that suits its rightful purpose. It has been found that PCA, DOBIN, Stray algorithm, and DAE-KNN have a high learning rate compared to Random projection, ROBEM, and OCP methods. …”
Get full text
Get full text
Article -
10
-
11
Development of ultrasonic tomography for composition determination of water and oil flow
Published 2005“…The image reconstruction algorithm that used in the software is linear back projection (LBP) algorithm. …”
Get full text
Get full text
Thesis -
12
Defects identification on semiconductor wafer for yield improvement using machine learning / Pedram Tabatabaeemoshiri
Published 2025“…This work presents a novel graph-based semi-supervised learning (GSSL) algorithm designed for wafer defect detection. The proposed methodology involves collecting wafer inspection data, extracting relevant features, and applying the GSSL algorithm to identify the hidden defects. …”
Get full text
Get full text
Get full text
Thesis -
13
Development of visual odometry based machinery motion assessment system / Low Shee Teng
Published 2022“…Machine diagnostics can be improved by using visual methods that magnify motion. Motion amplification aids in the visualization of complex vibration problems that are otherwise inaccessible to the human eye. …”
Get full text
Get full text
Get full text
Thesis -
14
Development of Machine Learning Algorithm for Acquiring Machining Data in Turning Process
Published 2004“…The most widely used source of such data is the Machining Data Handbook (MDH) published by Metcut Research Association, (1980). …”
Get full text
Get full text
Thesis -
15
SINGLE-TRIAL EXTRACTION OF VISUAL EVOKED POTENTIALS FROM THE BRAIN
Published 2008“…This scheme arbitrarily labeled as an eigen-decomposition (ED) method has been compared with a third-order correlation (TOC) method, using both realistic simulation and real human data. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Enhancing data integrity in internet of things-based healthcare applications: A visualization approach for duplicate detection
Published 2025“…However, scalability limitations were observed in larger datasets, where visual clarity declined. These findings highlight the value of visualization as a preliminary data quality assessment tool and suggest future integration with advanced detection algorithms to enhance robustness and scalability.…”
Get full text
Get full text
Get full text
Article -
17
Pixel value differencing steganography techniques: Analysis and open challenge
Published 2015“…Steganography is the science of secret data communication using carrier medium, such as images, videos, text, and networks. …”
Get full text
Get full text
Conference or Workshop Item -
18
The evolution and trend of chain code scheme
Published 2008“…Since it was introduced by Freeman, the development of chain code and its application increases rapidly. This paper explains some chain code concepts and their applications that are be the background of the development of vertex chain code cells algorithm. …”
Get full text
Get full text
Get full text
Article -
19
Enhancing data integrity in internet of things-based healthcare applications: a visualization approach for duplicate detection
Published 2025“…However, scalability limitations were observed in larger datasets, where visual clarity declined. These findings highlight the value of visualization as a preliminary data quality assessment tool and suggest future integration with advanced detection algorithms to enhance robustness and scalability…”
Get full text
Get full text
Get full text
Get full text
Article -
20
