Search Results - (( data integration test algorithm ) OR ( using codification using algorithm ))
Search alternatives:
- using codification »
- codification using »
- data integration »
- integration test »
- using algorithm »
- test algorithm »
-
1
The Determination of Pile Capacity Using Artificial Neural-net: An Optimization Approach
Published 2001“…Using the developed algorithm, the safety measures involved are such as reliability index and the probability of failure; instead of only factor of safety if conventional deterministic approach is used. …”
Get full text
Get full text
Article -
2
Facial features point localization using modified SIFT scale space / Zulfikri Paidi
Published 2020“…The third test on facial expression recognition process showed that the modified SIFT give more stable result than the results of the SIFT algorithm when the tests are performed on two different databases.…”
Get full text
Get full text
Thesis -
3
Energy Management in Integrated Microgrids: An Optimal Schedule Controller Utilizing Gradient Descent Algorithm
Published 2024“…Weather data, including wind, solar, fuel, and battery status, is integrated into the BGD algorithm for optimizing ON and OFF schedules. …”
Conference Paper -
4
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
Get full text
Get full text
Thesis -
5
Fsm-Based Enhanced March C- Algorithm For Memory Built-In Self-Test
Published 2017“…Thus, the improvement of the algorithms will allow more fault types being identified in single test. …”
Get full text
Get full text
Thesis -
6
Enhancement of bearing defect diagnosis via genetic algorithm optimized feature selection
Published 2015“…This is due to the features selected in this classifier is over-fitted to the training data and not generalized for variations in testing data. …”
Get full text
Get full text
Get full text
Thesis -
7
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Published 2017“…Data integrity must be ensured before and after the data transmission. …”
Get full text
Get full text
Thesis -
8
An integrated algorithm of analytical network process with case-based reasoning to support the selection of an ideal football team formation and players
Published 2021“…In order to demonstrate the feasibility of the algorithm, the engine was tested in the real application of football team management. …”
Get full text
Get full text
Get full text
Thesis -
9
Data clustering using the bees algorithm
Published 2007“…The paper presents test results to demonstrate the efficacy of the proposed algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
10
Jogging activity recognition using k-NN algorithm
Published 2022“…There are five phases Requirement gathering and analysis, System design, Implementation Integration, testing, and lastly is maintenance. Finally, usability testing will be used for evaluation. …”
Get full text
Get full text
Get full text
Academic Exercise -
11
-
12
Integrating of web 2.0 technologies for interactive courseware : data structure and algorithm as case study
Published 2013“…Besides that, the research also aims to develop a prototype for Interactive Courseware using Web 2.0 by integrating Web 2.0 technologies and services and lastly to evaluate the effectiveness and the usability of the project by comparing the pre-test and post-test result and surnmative evaluation respectively. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
13
False path identification algorithm framework for nonseparable controller-data path circuits
Published 2016“…This paper proposes an algorithm frame-work to deal with these false paths through identification for DFT test. …”
Get full text
Get full text
Conference or Workshop Item -
14
Secured route optimization in mobile IPv6 wireless networks in terms of data integrity
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm at a cost of a small increase in delay. …”
Get full text
Get full text
Conference or Workshop Item -
15
-
16
Graph processing hardware accelerator for shortest path algorithms in nanometer very large-scale integration interconnect routing
Published 2007“…Graphs are pervasive data structures in computer science, and algorithms working with them are fundamental to the field. …”
Get full text
Get full text
Get full text
Thesis -
17
False path identification algorithm framework for nonseparable controller-data path circuits
Published 2017“…This paper proposes an algorithm framework to deal with these false paths through identification for DFT test. …”
Get full text
Get full text
Article -
18
-
19
Adopting genetic algorithm to enhance state-sensitivity partitioning
Published 2015“…The existence of the redundant data state will increase the size of test suite and consequently the process of testing will be ineffective. …”
Get full text
Get full text
Conference or Workshop Item -
20
Adopting genetic algorithm to enhance state-sensitivity partitioning
Published 2015“…The existence of the redundant data state will increase the size of test suite and consequently the process of testing will be ineffective. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
