Search Results - (( using selection problems algorithm ) OR ( data visualization using algorithm ))

Refine Results
  1. 1

    Comparative Performance Analysis of Bat Algorithm and Bacterial Foraging Optimization Algorithm using Standard Benchmark Functions by Mazlina, Abdul Majid, Alsariera, Yazan A., Alamri, Hammoudeh S., Nasser, Abdullah M., Kamal Z., Zamli

    Published 2014
    “…Owing to the fact that they are new and much of their relative performance are still unknown (as compared to other established meta-heuristic algorithms), Bacterial Foraging Optimization Algorithm (BFO) and Bat Algorithm (BA) have been adopted for comparison using the 12 selected benchmark functions. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    A Comparative Study Of Blockchain Algorithms For Non-Fungible Token by Woo, Jan Yin

    Published 2023
    “…In this research, there will be some selected algorithms, which is Proof-of-Work and Proof-of-Stakes from open resource and modified to the suitable testing criteria to evaluate valid and sufficient data for data visualization. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3

    Using artificial intelligence search in solving the camera placement problem by Altahir, A.A., Asirvadam, V.S., Hamid, N.H.B., Sebastian, P.

    Published 2022
    “…Two case studies are used to evaluate those algorithms, and the camera placement problem is formulated as a coverage maximization problem. …”
    Get full text
    Get full text
    Book
  4. 4

    A genetic algorithm to minimise the maximum lateness on a single machine family scheduling problem by Lee, Lai Soon, Nazif, Habibeh

    Published 2009
    “…All algorithms are coded in ANSI-C using Microsoft Visual C++ 6.0 as the compiler, and run on a Pentium 4, 2.0 GHz computer with 2.0 GB RAM. …”
    Get full text
    Conference or Workshop Item
  5. 5

    Subspace Techniques for Brain Signal Enhancement by Kamel , Nidal, Yusoff, Mohd Zuki

    Published 2009
    “…Next, the validity and the effectiveness of the algorithms to detect the P100's (used in objective assessment of visual pathways) are evaluated using real patient data collected from a hospital. …”
    Get full text
    Get full text
    Book Section
  6. 6

    A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data by Suboh, Syahirah, Abdul Aziz, Izzatdin, Shaharudin, Shazlyn Milleana, Ismail, Saidatul Akmar, Mahdin, Hairulnizam

    Published 2023
    “…At the same time, it provides a clear insight into the techniques developed for anomaly detection problems. This paper aims to help select the best technique that suits its rightful purpose. …”
    Get full text
    Get full text
    Article
  7. 7

    A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data by Suboh, Syahirah, Abdul Aziz, Izzatdin, Shaharudin, Shazlyn Milleana, Ismail, Saidatul Akmar, Mahdin, Hairulnizam

    “…At the same time, it provides a clear insight into the techniques developed for anomaly detection problems. This paper aims to help select the best technique that suits its rightful purpose. …”
    Get full text
    Get full text
    Article
  8. 8

    A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data by Suboh, Syahirah, Abdul Aziz, Izzatdin, Shaharudin, Shazlyn Milleana, Ismail, Saidatul Akmar, Mahdin, Hairulnizam

    Published 2023
    “…At the same time, it provides a clear insight into the techniques developed for anomaly detection problems. This paper aims to help select the best technique that suits its rightful purpose. …”
    Get full text
    Get full text
    Article
  9. 9

    A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data by Suboh, Syahirah, Abdul Aziz, Izzatdin, Shaharudin, Shazlyn Milleana, Ismail, Saidatul Akmar, Mahdin, Hairulnizam

    Published 2023
    “…At the same time, it provides a clear insight into the techniques developed for anomaly detection problems. This paper aims to help select the best technique that suits its rightful purpose. …”
    Get full text
    Get full text
    Article
  10. 10

    A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data by Suboh, Syahirah, Abdul Aziz, Izzatdin, Shaharudin, Shazlyn Milleana, Ismail, Saidatul Akmar, Mahdin, Hairulnizam

    Published 2023
    “…At the same time, it provides a clear insight into the techniques developed for anomaly detection problems. This paper aims to help select the best technique that suits its rightful purpose. …”
    Get full text
    Get full text
    Article
  11. 11

    A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data by Suboh, Syahirah, Abdul Aziz, Izzatdin, Shaharudin, Shazlyn Milleana, Akmar Ismail, Saidatul, Mahdin, Hairulnizam

    Published 2023
    “…At the same time, it provides a clear insight into the techniques developed for anomaly detection problems. This paper aims to help select the best technique that suits its rightful purpose. …”
    Get full text
    Get full text
    Article
  12. 12

    A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data by Suboh, Syahirah, Abdul Aziz, Izzatdin, Shaharudin, Shazlyn Milleana, Akmar Ismail, Saidatul, Mahdin, Hairulnizam

    Published 2023
    “…At the same time, it provides a clear insight into the techniques developed for anomaly detection problems. This paper aims to help select the best technique that suits its rightful purpose. …”
    Get full text
    Get full text
    Article
  13. 13

    Edge assisted crime prediction and evaluation framework for machine learning algorithms by Adhikary, Apurba, Murad, Saydul Akbar, Munir, Md Shirajum, Choong Seon, Hong Seong

    Published 2022
    “…To anticipate occurrences, ML methods such as Decision Trees, Neural Networks, K-Nearest Neighbors, and Impact Learning are being utilized, and their performance is compared based on the data processing and modification used. A maximum accuracy of 81% is obtained for Decision Tree algorithm during the prediction of crime. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15

    An enhanced sequential exception technique for semantic-based text anomaly detection by Taiye, Mohammed Ahmed

    Published 2019
    “…Text data are characterized by having problems related to ambiguity, high dimensionality, sparsity and text representation. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Development of a Neural-Fuzzy Model for Machinability Data Selection in Turning Process by Kong, Hong Shim

    Published 2008
    “…A neural-fuzzy model has been developed to represent machinability data selection in turning process. Turning process is a branch of machining process, which is used to produce cylindrical parts. …”
    Get full text
    Get full text
    Thesis
  17. 17

    EEG-Based Person Authentication Modelling Using Incremental Fuzzy-Rough Nearest Neighbour Technique by Liew, Siaw Hong

    Published 2016
    “…The IncFRNN algorithm is able to control the size of training pool using predefined window size threshold. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Detection of the river sediment deposition area at Kuala Perlis river mouth using Landsat 8 OLI within the years 2019, 2020 and 2021 / Nur Zakira Ain Zamrun by Zamrun, Nur Zakira Ain

    Published 2022
    “…Quantification of Landsat 8 OLI satellite images was applied using ENVI software on the study area for detecting sedimentation in the study area that used image data band correlation in deposited river sediment through unsupervised classifier algorithm and selection of spectral bands for MNDWI. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Automatic detection and indication of pallet-level tagging from rfid readings using machine learning algorithms by Choong, Chun Sern

    Published 2020
    “…The ensemble learning technique, changes of activation function in Neural Network as well as the unsupervised learning (k-means clustering algorithm and Friis Transmission Equation) was also applied to classify the multiclass classification in pallet-level. …”
    Get full text
    Get full text
    Thesis
  20. 20