Search Results - (( based constructive based algorithm ) OR ( data integration using algorithm ))

Refine Results
  1. 1
  2. 2

    An integrated algorithm of analytical network process with case-based reasoning to support the selection of an ideal football team formation and players by Mohammad Zukuwwan, Zainol Abidin

    Published 2021
    “…However, there are very few algorithms or decision engines available that could actually be used by decision-makers to aid in the process of forming a football team. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Optimizing Decentralized Exam Timetabling with a Discrete Whale Optimization Algorithm by Emily Siew, Sing Kiang, Sze, San Nah, Goh, Say Leng

    Published 2025
    “…This paper presents a novel discrete Whale Optimization Algorithm approach, integrating the strengths of population-based and local-search algorithms for addressing the examination timetabling problem, a significant challenge many educational institutions face. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Optimizing decentralized exam timetabling with a discrete whale optimization algorithm by Emily Sing Kiang Siew, San nah sze, Say leng goh

    Published 2025
    “…This paper presents a novel discrete Whale Optimization Algorithm approach, integrating the strengths of population-based and local-search algorithms for addressing the examination timetabling problem, a significant challenge many educational institutions face. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Fuzzy algorithm for 3D coastal gemorphology mapping by DInSAR by Marghany, Maged, Hashim, Mazlan

    Published 2007
    “…The basic concept of fuzzy algorithm was used to filter DInSAR data. The equation of phase difference was modified by involving the weighted least square method. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed by Aneesa Ali, Ali Saeed

    Published 2017
    “…The results of the proposed search-based test data generator show significant performance compared to the existing search-based test data generator.…”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Simulation-Based Power Estimation for High Throughput SHA-256 Design on Unfolding Transformation by Shamsiah, Suhaili, Norhuzaimin, Julai, Asrani, Lit, Maimun Binti, Huja Hussin, Mohamad Faizrizwan bin, Mohd Sabri

    Published 2022
    “…In security system designs where data transmission must be properly encrypted to avoid eavesdropping and unwanted monitoring, the Hash Function is vital. In constructing the SHA-256 algorithm, high speed, compact size, and low power consumption are all factors to be taken into account for an efficient implementation. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  9. 9

    A combinatory algorithm of univariate and multivariate gene selection by Mahmoodian, Sayed Hamid, Marhaban, Mohammad Hamiruce, Abdul Rahim, Raha, Rosli, Rozita, Saripan, M. Iqbal

    Published 2009
    “…Microarray technology has provided the means to monitor the expression levels of a large number of genes simultaneously. Constructing a classifier based on microarray data has emerged as an important problem for diseases such as cancer. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Development of intelligent leak detection system based on artificial pressure transient signal using integrated Kurtosis-based Algorithm for Z-filter Technique (I-Kaz) by Hanafi, M. Yusop, M. F., Ghazali, Mohd Fadhlan, Mohd Yusof, Wan Sofian, Wan Hamat

    Published 2017
    “…The current paper presented the implementation of Integrated Kurtosis-based Algorithm for z-filter Technique (I-Kaz) to kurtosis ratio (I-Kaz-Kurtosis) for the purpose of self-decision method in selecting IMF with the correct IMF selecting criterion. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Development of Intelligent Leak Detection System Based on Artificial Pressure Transient Signal Using Integrated Kurtosis-Based Algorithm for Z-Filter Technique (I-Kaz) / Hanafi.M.Y... by M.Yusop, Hanafi, Ghazali, M.F., M.Yusof, M.F., W.Hamat, W.S.

    Published 2017
    “…The current paper presented the implementation of Integrated Kurtosis-based Algorithm for z-filter Technique (I-Kaz) to kurtosis ratio (I-Kaz-Kurtosis) for the purpose of self-decision method in selecting IMF with the correct IMF selecting criterion. …”
    Get full text
    Get full text
    Article
  12. 12

    Hierarchical multi-agent system in traffic network signalization with improved genetic algorithm by Tan, Min Keng, Chuo, Helen Sin Ee, Chin, Renee Ka Yin, Yeo, Kiam Beng, Teo, Kenneth Tze Kin

    Published 2019
    “…A dynamic modeling technique is proposed using Q-learning (QL) algorithm to online observe and learn the inflow-outflow traffic behaviors and extract the model parameters to update the evaluation model used in the fitness function of genetic algorithm (GA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  13. 13

    Digital Surface Model (DSM) Construction and Flood Hazard Simulation for Development Plans in Naga City, Philippines by Abd Rahman, Muhammad Zulkarnain, Dinand, Alkema

    Published 2007
    “…The geostatistical approach is used to investigate the effect of integrating multi-sources of elevation data by evaluating the nugget values. …”
    Get full text
    Get full text
    Article
  14. 14

    Resource scheduling algorithm with load balancing for cloud service provisioning by Priya, V., Sathiya Kumar, C., Kannan, R.

    Published 2019
    “…The objective of this work is to introduce an integrated resource scheduling and load balancing algorithm for efficient cloud service provisioning. …”
    Get full text
    Get full text
    Article
  15. 15

    ECG encryption enhancement with multi-layers of AES and DNA computing by Kh-Madhloom, Jamal

    Published 2023
    “…MATLAB 2017b, a reliable simulation method, was utilised throughout the construction and validation of the algorithm. The performance of the recommended approach makes it possible to thwart an attack using brute force considerably more fast than is possible with the encryption technologies that are currently in use. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Theory-guided machine learning for predicting and minimising surface settlement caused by the excavation of twin tunnels / Chia Yu Huat by Chia , Yu Huat

    Published 2024
    “…This is due to the data generated from the numerical model possess the pattern for the ML algorithm ease of prediction. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    A generalized laser simulator algorithm for optimal path planning in constraints environment by Aisha, Muhammad

    Published 2022
    “…A statistical test was used to demonstrate the efficiency of the proposed algorithm over the compared methods. …”
    Get full text
    Thesis
  19. 19

    Optimization of medical image steganography using n-decomposition genetic algorithm by Al-Sarayefi, Bushra Abdullah Shtayt

    Published 2023
    “…The methodology consists of five main phases: (1) initial investigation, (2) formulating an embedding scheme, (3) constructing a decomposition scheme, (4) integrating the schemes' design into the proposed technique, and (5) evaluating the proposed technique's performance based on parameters using medical datasets from kaggle.com. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    An intelligent DDoS attack detection tree-based model using Gini index feature selection method by Bouke, Mohamed Aly, Abdullah, Azizol, ALshatebi, Sameer Hamoud, Abdullah, Mohd Taufik, Atigh, Hayate El

    Published 2023
    “…Artificial Intelligence (AI) has recently attracted much attention and is widely used to build intelligent IDSs to preserve data confidentiality, integrity, and availability. …”
    Get full text
    Get full text
    Article