Search Results - (( set generation method algorithm ) OR ( data visualization using algorithm ))

Refine Results
  1. 1

    Using artificial intelligence search in solving the camera placement problem by Altahir, A.A., Asirvadam, V.S., Hamid, N.H.B., Sebastian, P.

    Published 2022
    “…However, regardless of the selection of the search technique, the solutions are usually attained by utilizing randomization restart settings. The chapter also carries out an analytical review of three main searching algorithms namely, generate and test, uninformed search, and hill climbing search algorithms. …”
    Get full text
    Get full text
    Book
  2. 2

    Optimization of the Jakim halal logo placement on qr code using enhanced genetic algorithm by Rohani, Fuaad

    Published 2018
    “…The thesis proposed a method to place a logo on top of the QR code, embedded with high data capacity, using Genetic Algorithm (GA) search technique to find appropriate size and location so the QR code can be decoded by various QR code decoders. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    The development of level of detail (LOD) technique in 3D computer graphics application by Ismail, Nor Anita Fairos, Daman, Daut, Mohd. Rahim, Mohd. Shafry

    Published 2009
    “…Drastic growth in computer simulation complexity and 3D scanning technology has boosted the size of geometry data sets used in visualization. Conventional (in-core) simplification techniques are sufficient in data reduction to accelerate graphics rendering. …”
    Get full text
    Get full text
    Monograph
  4. 4

    Initialization procedure in solving Optimal Power Flow (OPF) using Artificial Immune System (AIS) optimization technique / Aimi Idzwan Tajudin by Tajudin, Aimi Idzwan

    Published 2007
    “…The programmed that has been used in this project is MATLAB, which provides a high level computing language and interactive environment for algorithm development, data visualization, data analysis and numerical analysis. …”
    Get full text
    Get full text
    Thesis
  5. 5

    An enhanced sequential exception technique for semantic-based text anomaly detection by Taiye, Mohammed Ahmed

    Published 2019
    “…This study proposes an Enhanced Sequential Exception Technique (ESET) to detect semantic-based text anomaly by achieving five objectives: (1) to modify Sequential Exception Technique (SET) in processing unstructured text; (2) to optimize Cosine Similarity for identifying similar and dissimilar text data; (3) to hybridize modified SET with Latent Semantic Analysis (LSA); (4) to integrate Lesk and Selectional Preference algorithms for disambiguating senses and identifying text canonical form; and (5) to represent semantic-based text anomaly using First Order Logic (FOL) and Concept Network Graph (CNG). …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    A Salient Based Bag of Visual Word model (SBBoVW): improvements toward difficult object recognition and object location in image retrieval by Mansourian, Leila, Abdullah, Muhamad Taufik, Abdullah, Lilli Nurliyana, Azman, Azreen, Mustaffa, Mas Rina

    Published 2016
    “…This method integrates SIFT features of the original and salient parts of pictures and fuses them together to generate better codebooks using bag of visual word method. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Hierarchical extreme learning machine based reinforcement learning for goal localization by AlDahoul, Nouar, Htike, Zaw Zaw, Akmeliawati, Rini

    Published 2017
    “…The visual data, a set of images, is high dimensional unstructured data and needs to be represented efficiently to get a robust detector. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8
  9. 9

    Development Of Distributed Grid-Based Hydrological Model And Floodplain Inundation Management System by Al_Fugara, A’kif Mohammed Salem

    Published 2008
    “…The DEM of 90m resolution, used to calculate slopes that generated runoffs, was derived from radar data sets (C-band) of the Shuttle Radar Topography Mission (SRTM) using the interferometric approach. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Development of a spreadsheet-based solver: Modeling momentum and energy transport in PEMFC cathode by Nurul Raihan Primuharsa Putra

    Published 2023
    “…The Finite Volume Method (FVM), Power Law scheme and Semi-Implicit Method for Pressure-Linked (SIMPLE) Algorithm were applied. …”
    text::Thesis
  11. 11
  12. 12

    SEALiP: A simple and efficient algorithm for listing permutation via starter set method by Ibrahim, Haslinda, Zake, Lugean, Omar, Zurni, Karim, Sharmila

    Published 2013
    “…Algorithm for listing permutations for n elements is an arduous task.This paper attempts to introduce a novel method for generating permutations.The fundamental concept for this method is to seek a starter set to begin with as an initial set to generate all distinct permutations. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Comparison between starter sets generation method for listing all permutations by Karim, Sharmila, Ibrahim, Haslinda, Omar, Zurni

    Published 2013
    “…distinct permutations is an exhaustive process.Using starter set, the process of listing the permutations becomes easy.However a problem arises when the equivalence starter sets will generate the similar permutation and needed to be discarded.Two new recursive strategies are proposed to generate starter sets without generating equivalence starter sets namely circular and exchange two elements operation.Once the starter sets are obtained, the circular and reverse of circular operation are employed to produce distinct permutation from each starter sets.Computational advantages are presented comparing the results obtained by the new method with two other existing methods.The result indicates that the exchange two elements based strategy is faster than the circular based.Overall all new algorithms are better than existing algorithms in time execution.…”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15

    A permutation parallel algorithm under exchange restriction with message passing interface by Karim, Sharmila, Omar, Zurni, Ibrahim, Haslinda

    Published 2014
    “…The permutation generation method is based on starter sets generation under exchange operation and exploited it for listing down all n! …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Budget visualizer using circle packing technique / Nursyahira Zulkeply by Zulkeply, Nursyahira

    Published 2019
    “…In order to construct this data visualization, the circle packing algorithm is used to visualize these budgets. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The experiments were conducted on self generated data sets (7 different sets) and well known datasets (Mushroom & Cars Data set). …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    A new starter sets generation method by fixing any element under exchange restriction by Karim, Sharmila, Ibrahim, Haslinda, Omar, Zurni, Sapiri, Hasimah

    Published 2016
    “…Permutation array are of recent interest because of their application to data transmission over power lines.A new permutation technique based on distinct starter sets by employing circular and reversing operations.The crucial task is to generate the distinct starter sets by eliminating the equivalence starter sets.Meanwhile a new strategy for starter sets generation without generating its equivalence starter sets were developed and more efficient in terms of computation time compared to old method. …”
    Get full text
    Get full text
    Article