Search Results - (( developing function using algorithm ) OR ( data integration using algorithm ))
Search alternatives:
- developing function »
- integration using »
- data integration »
- using algorithm »
-
1
Development of an algorithm for correlation of aircraft positioning data from radar and ADS-B sensors / Koh Che Hun
Published 2019“…Based on the findings, a multi-sensor data correlation algorithm is developed. The algorithm is validated using real time radar and ADS-B data from Department of Civil Aviation Malaysia (CAAM). …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
A faster version of rijndael cryptographic algorithm using cyclic shift and bit wise operations
Published 2009“…These modules are included in the Mixcolumn function. From the proposal of AES, the Mixcolumn function was suggested to solve the problem of delay by using look-up tables. …”
Get full text
Get full text
Article -
4
Input Information in the Approximate Calculation of Two-Dimensional Integral from Highly Oscillating Functions (Irregular Case)
Published 2019“…The estimation of proposed method has been done for the Lipschitz class and class of differentiable functions. The proposed formula is based on the algorithm, which is also effective for a class of discontinuous functions.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Automated data process in participatory sensing using QR-code and EAN-13 barcode
Published 2018“…The enhanced algorithm was evaluated using a developed prototype which is an Android mobile application of a crowdsourcing data submission based on product price and information, WE+Price, in which, the algorithm was embedded. …”
Get full text
Get full text
Thesis -
6
Fuzzy clustering method and evaluation based on multi criteria decision making technique
Published 2018“…The proposed algorithm is used as a pre-processing method for data followed by Gustafson-Kessel (GK) algorithm to classify credit scoring data. …”
Get full text
Get full text
Get full text
Thesis -
7
Jogging activity recognition using k-NN algorithm
Published 2022“…Jogging activity recognition using the k-NN algorithm is a system that can help users collect information data of user speed movement using speed sensor and give the classification of jogging activity to the user. …”
Get full text
Get full text
Get full text
Academic Exercise -
8
Normalized Relational Storage for Extensible Markup Language (XML) Schema
Published 2011“…Problem statement: The use of XML as the common formats for representing, exchanging, storing, integrating and accessing data posses many new challenges to database systems. …”
Get full text
Get full text
Journal -
9
Constraint preserving mapping algorithm for XML storage
Published 2006“…The use of XML as the common format for representing, exchanging, storing, integrating and accessing data poses many new challenges to database systems. …”
Get full text
Get full text
Conference or Workshop Item -
10
Modelling and optimization of a transit services with feeder bus and rail system / Mohammadhadi Almasi
Published 2015“…In this study, optimized transit services and coordinated schedules are developed using metaheuristic algorithms such as genetic algorithm (GA), particle swarm optimization (PSO), water cycle algorithm (WCA) and imperialist competitive algorithm (ICA). …”
Get full text
Get full text
Thesis -
11
New random approaches of modified adaptive bats sonar algorithm for reservoir operation optimization problems
Published 2024“…Subsequently, it is exploring into the development of random approaches based on MABSA, integrating components into others algorithm whereby Squirrel Search Algorithm (SSA), Cauchy Mutation (CM) approach, and Doppler Effect (DE) phenomenon. …”
Get full text
Get full text
Thesis -
12
Hybrid Artificial Bees Colony algorithms for optimizing carbon nanotubes characteristics
Published 2018“…Chemical Vapor Deposition (CVD) is the most efficient method for CNTs production.However,using CVD method encounters crucial issues such as customization,time and cost.Therefore,Response Surface Methodology (RSM) is proposed for modeling and the ABC-βHC is proposed for optimization purpose to address such issues.The selected CNTs characteristics are CNTs yield and quality represented by the ratio of the relative intensity of the D and G-bands (ID/IG).Six case studies are generated from collected dataset including four cases of CNTs yield and one case of ID/IG as single objective optimization problems,while the sixth case represents multi-objective problem.The input parameters of each case are a subset from the set of input parameters including reaction temperature,duration,carbon dioxide flow rate,methane partial pressure,catalyst loading,polymer weight and catalyst weight.The models for the first three case studies were mentioned in the original work.RSM is proposed to develop polynomial models for the output responses in the other three cases and to identi significant process parameters and interactions that could affect the CNTs output responses.The developed models are validated using t-test,correlation and pattern matching.The predictive results have a good agreement with the actual experimental data.The models are used as objective functions in optimization techniques.For multi-objective optimization,this study proposes Desirability Function Approach (DFA) to be integrated with other proposed algorithms to form hybrid techniques namely RSM-DFA,ABC-DFA and ABC-βHC-DFA.The proposed algorithms and other selected well-known algorithms are evaluated and compared on their CNTs yield and quality.The optimization results reveal that ABC-βHC and ABC-βHC-DFA obtained significant results in terms of success rate,required time,iterations,and function evaluations number compared to other well-known algorithms.Significantly,the optimization results from this study are better than the results from the original work of the collected dataset.…”
Get full text
Get full text
Get full text
Thesis -
13
Fair Traffic Scheduling and Shaping Algorithms for Diffserv Networks
Published 2006“…The interaction of different traffic type flows in a DiffServ networks using the proposed integration model between FWFQ and the dual token bucket shaper algorithm is analyzed. …”
Get full text
Get full text
Thesis -
14
Design of a floating point unit for 32-bit 5 stage pipeline processor
Published 2020“…The development project will start by studying the algorithm of addition on floating point numbers. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Uninterruptible power supply topology using single phase matrix converter with active power filter functionality / Muhammad Shawwal Mohamad Rawi
Published 2022“…Finally, the effectiveness of the proposed circuit topology and the proposed switching algorithms for the proposed UPS system are verified through the computer simulation model using MATLAB/Simulink and an experimental test rig. …”
Get full text
Get full text
Thesis -
16
Assessment of crops healthiness via deep learning approach: Python / Mohamad Amirul Asyraf Mohd Ramli
Published 2023“…This study focuses on using Python for remote sensing data analysis to identify and classify healthy crops. …”
Get full text
Get full text
Student Project -
17
Optimal demand response of solar energy generation using Genetic Algorithm / Muhammad Asyraaf Adlan
Published 2025“…The aim of this study is to optimize the demand response of solar energy generation using Genetic Algorithm (GA) to minimize the daily yield loss caused by load shedding. …”
Get full text
Get full text
Thesis -
18
Design and implementation of multimedia digital matrix system
Published 2005“…Due to the issues of signal integrity in high-speed digital design, a new adaptive channel synchronization algorithm has been developed. …”
Get full text
Get full text
Conference or Workshop Item -
19
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Article -
20
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article
