Search Results - (( model evaluation method algorithm ) OR ( data visualization using algorithm ))
Search alternatives:
- data visualization »
- evaluation method »
- model evaluation »
- method algorithm »
- using algorithm »
-
1
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
2
Visual Simultaneous Localization and Mapping Using Direct-Based Method for Unmanned Aerial Vehicle (UAV)
Published 2023“…The Direct Sparse Odometry (DSO) technique is a new form of visual odometry that makes use of a direct and sparse structure to achieve precision. …”
Get full text
Get full text
Get full text
Article -
3
A review on monocular tracking and mapping: from model-based to data-driven methods
Published 2022“…Visual odometry and visual simultaneous localization and mapping aid in tracking the position of a camera and mapping the surroundings using images. …”
Get full text
Get full text
Article -
4
An improved plant identification system by Fuzzy c-means bag of visual words model and sparse coding
Published 2020“…This demonstrate the intensity of the correlation between that aspect of data and a specific cluster. In the classic Bag of visual words model, the Fuzzy c-means algorithm is replaced with K-means and the accuracy of SIFT matching is increased. …”
Get full text
Get full text
Get full text
Article -
5
Musical instrument identification using Convolutional Neural Network (CNN) algorithm / Muhammad Nur Azri Irfan Abdul Rahman
Published 2025“…This approach tried to overcome the limitations of the manual method and traditional algorithm, which tends to fail with the diverse dataset, diverse visual features, and scalability. …”
Get full text
Get full text
Thesis -
6
Sentiment Analysis of Airline Reviews Using Naive Bayes Algorithm / Ahmad Firdaus Maliki
Published 2021“…The overview for the methodology is divided into three phases which are preliminary phase, design and implementation phase and evaluation phase. Several classifier models have been built by using Naive Bayes algorithm during the design and implementation phase where the model that has the highest accuracy has been chosen for this project. …”
Get full text
Get full text
Thesis -
7
Data mining based damage identification using imperialist competitive algorithm and artificial neural network
Published 2018“…The efficiency coefficient and mean square error (MSE) are used to evaluate the performance of the ICA-ANN model. …”
Get full text
Get full text
Article -
8
EEG-and MRI-based epilepsy source localization using multivariate empirical mode decomposition and inverse solution method
Published 2018“…Therefore proposed algorithm has the advantages to localize EZ using ESL inexpensively and accurately which promotes usage of this valuable technique for epilepsy pre-surgical evaluation.…”
Get full text
Get full text
Thesis -
9
Development of a Spatiotemporal Data Model for Management and Visualization of Surface Movement Data
Published 2008“…In order to test and evaluate the SMST Data Model, a database management system with a loading and a retrieval algorithm suitable to this model were developed. …”
Get full text
Get full text
Thesis -
10
Edge assisted crime prediction and evaluation framework for machine learning algorithms
Published 2022“…In particular, this study proposes a crime prediction and evaluation framework for machine learning algorithms of the network edge. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Using artificial intelligence search in solving the camera placement problem
Published 2022“…Two case studies are used to evaluate those algorithms, and the camera placement problem is formulated as a coverage maximization problem. …”
Get full text
Get full text
Book -
12
Virtual reality in algorithm programming course: practicality and implications for college students
Published 2024“…The ADDIE model is applied in this study to develop products through the stages of analysis, design, development, implementation, and evaluation. …”
Get full text
Get full text
Get full text
Article -
13
A Hybrid Artificial Intelligence Model for Detecting Keratoconus
Published 2023“…This paper proposes a new unsupervised model to detect KCN, based on adapted flower pollination algorithm (FPA) and the k-means algorithm. …”
Article -
14
Hybrid artificial bee colony algorithm with branch and bound for two–sided assembly line balancing
Published 2018“…Recently, the artificial bee colony (ABC) algorithm was used in the solution process where it was considered as a very useful, effective and well-known algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
A Salient Based Bag of Visual Word model (SBBoVW): improvements toward difficult object recognition and object location in image retrieval
Published 2016“…This method integrates SIFT features of the original and salient parts of pictures and fuses them together to generate better codebooks using bag of visual word method. …”
Get full text
Get full text
Get full text
Article -
16
Subspace Techniques for Brain Signal Enhancement
Published 2009“…Next, the validity and the effectiveness of the algorithms to detect the P100's (used in objective assessment of visual pathways) are evaluated using real patient data collected from a hospital. …”
Get full text
Get full text
Book Section -
17
Low-light image analysis and contrast enhancement using gaussian process / Loh Yuen Peng
Published 2018“…Additionally, novel information retrieval measurements are proposed to better evaluate the usefulness of enhancement algorithms in applications, namely the local features matching and l1-norm distance measure of intensity histogram. …”
Get full text
Get full text
Thesis -
18
The implementation of market basket analysis in menu association model for Corm Café / Nur Amalina Kamarulzaman
Published 2018“…Besides that, CRISP-DM is used as a method throughout this research which is starting from business understanding, data understanding, data preparation, model building, evaluation and testing and lastly deployment. …”
Get full text
Get full text
Thesis -
19
Applications of contemporary artificial intelligence technology in forensic odontology as primary forensic identifier : A scoping review
Published 2022“…Objective: This article aims to evaluate current artificial intelligence applications and discuss their performance concerning the algorithm architecture used in forensic odontology. …”
Get full text
Get full text
Get full text
Article -
20
EEG-Based Person Authentication Modelling Using Incremental Fuzzy-Rough Nearest Neighbour Technique
Published 2016“…The IncFRNN technique was evaluated using a collected EEG data from 37 subjects. …”
Get full text
Get full text
Get full text
Get full text
Thesis
