Search Results - (( its application using algorithm ) OR ( data visualization using algorithm ))

Refine Results
  1. 1

    Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun by Kok , Sun Sun

    Published 2000
    “…The system is able to update the information from the database provided that the administrator monitors its activities periodically. This system is achieved using the Genetic Algorithm which is capable of performing information retrieval and learning algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Autonomous Target Tracking Of A Quadrotor UAV Using Monocular Visual-Inertial Odometry by Chin, Mun Xue

    Published 2018
    “…Referring to and improving the state-of-the-art CV algorithms, there is a newly formulated approach to detect the designed visual marker. …”
    Get full text
    Get full text
    Monograph
  3. 3

    Development of obstable avoidance system for 3D robot navigation by Er, Kai Sheng

    Published 2024
    “…In conclusion, the developed algorithm enables the robot to detect obstacles that are not on the same plane as the 2D LiDAR and cannot be detected using depth camera data.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4
  5. 5

    Determining the graduates employability using data analytics model by Matos Jr., Zenon A.

    Published 2023
    “…These studies used a data analytics model to forecast the employability of graduates using the linear regression algorithm and the SMOreg algorithm, predict the number of graduates in the next 3 years in the BS Information Technology program, and determine the percentage of graduates who are employed and unemployed using the data sourced from the tracer study conducted. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    A Time-Domain Subspace Technique for Estimating Visual Evoked Potential Latencies by Yusoff, Mohd Zuki, Kamel, Nidal

    Published 2010
    “…Additionally, the results of the real patient data confirm the superiority of GSA over TOC in estimating VEP's P100 latencies, which are used by clinicians to assess the conduction of electrical signals from the subjects' retinas to the visual cortex parts of their brains.…”
    Get full text
    Get full text
    Get full text
    Citation Index Journal
  7. 7

    Classification and visualization on eligibility rate of applicant’s LinkedIn account using Naïve Bayes / Nurul Atirah Ahmad by Ahmad, Nurul Atirah

    Published 2023
    “…This project implements the Naive Bayes algorithm as the classification algorithm. The collected data from LinkedIn profiles then undergoes data preprocessing. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Wearable based-sensor fall detection system using machine learning algorithm by Ishak, Anis Nadia, Habaebi, Mohamed Hadi, Yusoff, Siti Hajar, Islam, Md. Rafiqul

    Published 2021
    “…Then, a Machine Learning Algorithm (MLA) is used to train and test the data before a classifier is used to classify the new incoming dataset. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  9. 9

    Development of Machine Learning Algorithm for Acquiring Machining Data in Turning Process by Ali Al-Assadi, Hayder M. A.

    Published 2004
    “…The most widely used source of such data is the Machining Data Handbook (MDH) published by Metcut Research Association, (1980). …”
    Get full text
    Get full text
    Thesis
  10. 10

    Image steganography using web application / Nor Arzami Othman ... [et al.] by Othman, Nor Arzami, Shariffudin, Muhammad Nur Harith, Osman, Mohd Nizam, Sedek, Khairul Anwar

    Published 2023
    “…The application utilizes an advanced steganographic algorithm, which is Randomized Least Significant Bit (RLSB), to ensure robust data concealment while maintaining the visual integrity of the cover image. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Sentiment analysis of customer review for Tina Arena Beauty by Amri, Nur Najwa Shahirah

    Published 2025
    “…Customer review data were collected from multiple platforms and processed using Natural Language Processing (NLP) techniques such as Term Frequency-Inverse Document Frequency (TF-IDF). …”
    Get full text
    Get full text
    Student Project
  13. 13

    A Modified Hopfield Neural Network Algorithm (MHNNA) Using ALOS Image for Water Quality Mapping by Ahmed Asal Kzar, Ahmed Asal Kzar, M Jafri, Mohd Zubir, Mutter, Kussay N., Anwar, Saumi Syahreza

    Published 2016
    “…The TSS map was color-coded for visual interpretation. The efficiency of the proposed algorithm was investigated by dividing the validation data into two groups. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Angle Based Protein Tertiary Structure Prediction Using Bees Optimization Algorithm by Al-Qattan, Zakaria Noor Aldeen Mahmood

    Published 2010
    “…WEKA program application was used for main chain angles (Phi and Psi) data classification. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Development of ultrasonic tomography for composition determination of water and oil flow by Ng, Wei Nyap

    Published 2005
    “…The image reconstruction algorithm that used in the software is linear back projection (LBP) algorithm. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data by Suboh, Syahirah, Abdul Aziz, Izzatdin, Shaharudin, Shazlyn Milleana, Ismail, Saidatul Akmar, Mahdin, Hairulnizam

    Published 2023
    “…In data analysis, recognizing unusual patterns (outliers’ analysis or anomaly detection) plays a crucial role in identifying critical events. Because of its widespread use in many applications, it remains an important and extensive research brand in data mining. …”
    Get full text
    Get full text
    Article
  17. 17

    A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data by Suboh, Syahirah, Abdul Aziz, Izzatdin, Shaharudin, Shazlyn Milleana, Ismail, Saidatul Akmar, Mahdin, Hairulnizam

    “…—In data analysis, recognizing unusual patterns (outliers’ analysis or anomaly detection) plays a crucial role in identifying critical events. Because of its widespread use in many applications, it remains an important and extensive research brand in data mining. …”
    Get full text
    Get full text
    Article
  18. 18

    A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data by Suboh, Syahirah, Abdul Aziz, Izzatdin, Shaharudin, Shazlyn Milleana, Ismail, Saidatul Akmar, Mahdin, Hairulnizam

    Published 2023
    “…In data analysis, recognizing unusual patterns (outliers’ analysis or anomaly detection) plays a crucial role in identifying critical events. Because of its widespread use in many applications, it remains an important and extensive research brand in data mining. …”
    Get full text
    Get full text
    Article
  19. 19

    A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data by Suboh, Syahirah, Abdul Aziz, Izzatdin, Shaharudin, Shazlyn Milleana, Ismail, Saidatul Akmar, Mahdin, Hairulnizam

    Published 2023
    “…In data analysis, recognizing unusual patterns (outliers’ analysis or anomaly detection) plays a crucial role in identifying critical events. Because of its widespread use in many applications, it remains an important and extensive research brand in data mining. …”
    Get full text
    Get full text
    Article
  20. 20

    A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data by Suboh, Syahirah, Abdul Aziz, Izzatdin, Shaharudin, Shazlyn Milleana, Ismail, Saidatul Akmar, Mahdin, Hairulnizam

    Published 2023
    “…In data analysis, recognizing unusual patterns (outliers’ analysis or anomaly detection) plays a crucial role in identifying critical events. Because of its widespread use in many applications, it remains an important and extensive research brand in data mining. …”
    Get full text
    Get full text
    Article