Search Results - (( variable detection based algorithm ) OR ( data visualisation using algorithm ))

Refine Results
  1. 1

    Multi-dimensional Data Visualisation using Mobile Augmented Reality by Rehman Ullah, Khan, Yin, Bee Oon, Ahmad Sofian, Shminan, Lee, Jun Choi, Chen, Jacqueline How Ting

    Published 2020
    “…Therefore, this algorithm uses AR to provide a multi-display solution for improved data visualisation after processing, summarising and classifying data. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Effectiveness of silhouette rendering algorithms in terrain visualisation by Che Mat, Ruzinoor, Visvalingam, Mahes

    Published 2002
    “…Silhouette Rendering Algorithms have been successfully used in various applications such as communicating shape and cartoon rendering.This paper explores how effective silhouette rendering algorithms could be used in terrain visualisation. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Visualisation System of COVID-19 Data in Malaysia by Rehman Ullah, Khan, NOR SYAZA, SYAMIMI, CLADIA SIMBUT, MAMBANG, IVY, THOMAS, TZI NI, WEE

    Published 2021
    “…This study aims to provide a system, using COVID-19 data as a sample to visualise and analyse cases, deaths, discharged ICU cases updates in Malaysia as a whole state wise of COVID-19 daily statistics. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    3D terrain visualisation for GIS: A comparison of different techniques by Ruzinoor, Che Mat, Mohamed Shariff, Abdul Rashid, Mahmud, Ahmad Rodzi, Pradhan, Biswajeet

    Published 2011
    “…The results of this paper will be of help to the users in identifying the best technique of terrain visualisation suitable for GIS data.…”
    Get full text
    Get full text
    Book Section
  5. 5

    Visualisation System of COVID-19 Data in Malaysia by Rehman Ullah, Khan, NOR SYAZA, SYAMIMI, CLADIA SIMBUT, MAMBANG, IVY, THOMAS, NI WEE, TZI

    Published 2021
    “…This study aims to provide a system, using COVID-19 data as a sample to visualise and analyse cases, deaths, discharged ICU cases updates in Malaysia as a whole state wise of COVID-19 daily statistics. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    A COMPARISON STUDY OF DATA CLUSTERING AND VISUALISATION TECHNIQUES WITH VARIOUS DATA TYPES by Ling, Chien

    Published 2020
    “…Clustering is used to identify the intrinsic grouping of a set of unlabelled data. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  7. 7

    Observer-based fault detection with fuzzy variable gains and its application to industrial servo system by Eissa, Magdy Abdullah, Sali, Aduwati, Hassan, Mohd Khair, Bassiuny, A. M., Darwish, Rania R.

    Published 2020
    “…The proposed fault detection algorithm employs a fuzzy logic-based approach with the objective of finding the appropriate observer gains that could cope with the different working conditions. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Comparing seabed roughness result from QPS fledermaus software, benthic trrain modeler [BTM] and developed model derived FRM slope variability algorithm for hard coral reef detecti... by Mohd Sayud, Nur Asikin

    Published 2018
    “…In this study, several models has been created which are from QPS Fledermaus model, BTM model and Slope Variability model. Slope variability model is an algorithm that is being used for detecting terrain roughness. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Minimization of Test Cases and Fault Detection Effectiveness Improvement through Modified Reduction with Selective Redundancy Algorithm by Nikfal, Shima

    Published 2007
    “…Then the algorithm gathers all the test cases based on the definition occurrence and def-use pair if they cover same definition occurrence of one variable but they don’t cover def-use pair of the same variable. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Fault diagnostic algorithm for precut fractionation column by Heng, H. Y., Ali, Mohamad Wijayanuddin, Kamsah, Mohd. Zaki

    Published 2004
    “…Hazard and Operability Study (HAZOP) is used to support the diagnosis task. The algorithm has been successful in detecting the deviations of each variable by testing the data set. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Potential norms detection in social agent societies by Mahmoud M.A., Mustapha A., Ahmad M.S., Ahmad A., Yusoff M.Z.M., Hamid N.H.A.

    Published 2023
    “…In this paper, we propose a norms mining algorithm that detects a domain's potential norms, which we called the Potential Norms Mining Algorithm (PNMA). …”
    Article
  13. 13

    Artificial immune system based on real valued negative selection algorithms for anomaly detection by Khairi, Rihab Salah

    Published 2015
    “…With respect to all the algorithms, V-Detector proved to be superior and surpassed all other algorithms based on performance and execution time.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    A case study : 2D Vs 3D parallel differential equation toward tumor cell detection on multi-core parallel computing atmosphere by Islam, Md. Rajibul, Alias, Norma

    Published 2010
    “…In order to detect tumour cells, 2D and 3D Partial Differential Equations (PDE) are considered and compared by using Multi-Core parallel computing atmosphere with visualisation, communication and data analysis. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Building norms-adaptable agents from Potential Norms Detection Technique (PNDT) by Mahmoud M.A., Ahmad M.S., Ahmad A., Mustapha A., Yusoff M.Z.M., Hamid N.H.A.

    Published 2023
    “…This technique enables an agent to update its norms even in the absence of sanctions from a third-party enforcement authority as found in some work, which entail sanctions by a third-party to detect and identify the norms. The PNDT consists of five components: agent's belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent's belief base with new normative protocol. …”
    Short Survey
  17. 17
  18. 18

    Shape-based Road Sign Detection and Recognition for Embedded Application Using MATLAB by Md Sallah, Siti Sarah, Hussin, Fawnizu Azmadi, Yusoff, Mohd Zuki

    Published 2010
    “…The algorithm is based on the Hough transform method to detect lines in order to identify and determine the shape of the road sign. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20

    PREDICTION OF HFMD DISEASE OUTBREAK FROM TWITTER by Tay, Guo Hong

    Published 2019
    “…This is because both Naive Bayes and SVM are baseline algorithm used in text classification. In the end, a visualisation of HFMD Disease Map is presented to visualize the city that suffer HFMD outbreak using geo-located tweet that related with HFMD. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD