Search Results - (( using function methods algorithm ) OR ( data visualization based algorithm ))
Search alternatives:
- visualization based »
- data visualization »
- methods algorithm »
- function methods »
- using function »
-
1
Interpretation of machine learning model using medical record visual analytics
Published 2021“…This paper analyzed several visual analytics ap- proach instantiated in machine learning algorithm for medical record analytics. …”
Get full text
Get full text
Proceeding Paper -
2
Decoding of visual activity patterns from fMRI responses using multivariate pattern analyses and convolutional neural network
Published 2017“…MVPA-CNN based proposed algorithm is compared with region of interest (ROI) based method and MVPA based estimated values. …”
Get full text
Get full text
Article -
3
A Multidimensional Search Space Using Interactive Genetic Algorithm
Published 2010“…This paper applied an Interactive Genetic Algorithm (IGA) technique to design an visualization environment for search space. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Interpretation of machine learning model using medical record visual analytics
Published 2022“…This paper analyzed several visual analytics approaches instantiated in machine learning algorithm for medical record analytics. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
5
Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli
Published 2021“…The main goal of this study is to create an online food ordering app using the corresponding Boyer-Moore string matching algorithm. …”
Get full text
Get full text
Thesis -
6
Optimization of the Jakim halal logo placement on qr code using enhanced genetic algorithm
Published 2018“…The thesis proposed a method to place a logo on top of the QR code, embedded with high data capacity, using Genetic Algorithm (GA) search technique to find appropriate size and location so the QR code can be decoded by various QR code decoders. …”
Get full text
Get full text
Get full text
Thesis -
7
Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique
Published 2018“…However, this method has the difficulty in selecting the suitable IMF for the next data post-processing method, which is Hilbert Transform (HT). …”
Get full text
Get full text
Thesis -
8
Clustering autism spectrum disorder student’s system based on intelligence, skills and behavior using agglomerative clustering algortihm / Daarin Nadia Nordin
Published 2020“…Data cleaning and data transformation is first carried out, followed by normalization through the Z-score method before being processed in the clustering model. …”
Get full text
Get full text
Thesis -
9
E-Raser: file shredder application with content replacement by using random words function
Published 2018“…Thus, this study proposed a file shredding application named E-Raser which replacing the content of the file using random words function algorithm. A file shredder application named E-Raser was developed to shred Microsoft Word documents with (.doc) or (.docx) format. …”
Get full text
Get full text
Get full text
Article -
10
Development of Machine Learning Algorithm for Acquiring Machining Data in Turning Process
Published 2004“…In designing the network, a combination of back propagation or generalized delta learning rule with sigmoid transfer function has been used. The machining data available in MDH was used to train the designed network. …”
Get full text
Get full text
Thesis -
11
Segmentation of Magnetic Resonance Brain Images Using Watershed Algorithm
Published 2004“…The proposed technique based on the watershed algorithm, which is applied to the gradient magnitude of the MRI data. …”
Get full text
Get full text
Thesis -
12
Removal of BCG artefact from concurrent fMRI-EEG recordings based on EMD and PCA
Published 2017“…One such problematic artefact is the ballistocardiogram (BCG) artefact. Methods We developed a hybrid algorithm that combines features of empirical mode decomposition (EMD) with principal component analysis (PCA) to reduce the BCG artefact. …”
Get full text
Get full text
Article -
13
Craniofacial surgery simulation using volumetric object representations
Published 2006“…This research focuses on development of a system for simulation of craniofacial reconstruction surgery based on CT and laser scan data. The surfaces of soft tissue and hard tissue have been extracted from CT data using Marching Cubes algorithm and are rendered with surface based methods. …”
Get full text
Get full text
Conference or Workshop Item -
14
Deep Reinforcement Learning For Control
Published 2021“…In essence, the method is to use a reward-based learning environment to watch how the agent makes decisions. …”
Get full text
Get full text
Monograph -
15
Identifying the mechanism to forecast the progression of Alzheimer’s disease from mild cognitive impairment using deep learning
Published 2022“…This study also implemented a CNN algorithm based on 3D ResNet-18 model using weights from ImageNet for the classification task of CN vs AD and sMCI vs pMCI. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
The implementation of market basket analysis in menu association model for Corm Café / Nur Amalina Kamarulzaman
Published 2018“…Besides that, CRISP-DM is used as a method throughout this research which is starting from business understanding, data understanding, data preparation, model building, evaluation and testing and lastly deployment. …”
Get full text
Get full text
Thesis -
17
Applications of IoT and Artificial Intelligence in Water Quality Monitoring and Prediction: A Review
Published 2023Conference Paper -
18
-
19
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…This research was undertaken to develop methods to mitigate shoulder-surfing attack. Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Tacit knowledge for business intelligence framework using cognitive-based approach
Published 2022“…This research contributes to the methods of capturing tacit knowledge using a cognitive-based approach, which important to ensure the continuity of business in various domains.…”
Get full text
Get full text
Thesis
