Search Results - (( using function based algorithm ) OR ( data integration using algorithm ))
Search alternatives:
- integration using »
- data integration »
- using algorithm »
- using function »
-
1
Gravitational search – bat algorithm for solving single and bi-objective of non-linear functions
Published 2018“…The second technique is to solve bi-objective functions by using the BOBAT algorithm. The third technique is an integration of BOGSA with BOBAT to produce a BOGSBAT algorithm. …”
Get full text
Get full text
Thesis -
2
-
3
An enhanced Blowfish Algorithm based on cylindrical coordinate system and dynamic permutation box
Published 2014“…The enhanced BA is known as Ramlan Ashwak Faudziah (RAF) algorithm. The implementation phase involved performing key expansion, data encryption, and data decryption. …”
Get full text
Get full text
Get full text
Thesis -
4
Modeling time series data using Genetic Algorithm based on Backpropagation Neural network
Published 2018“…This study showed the task of optimizing the topology structure and the parameter values (e.g., weights) used in the BPNN learning algorithm by using the GA. …”
Get full text
Get full text
Thesis -
5
Development of an algorithm for correlation of aircraft positioning data from radar and ADS-B sensors / Koh Che Hun
Published 2019“…Based on the findings, a multi-sensor data correlation algorithm is developed. …”
Get full text
Get full text
Get full text
Thesis -
6
Automated data process in participatory sensing using QR-code and EAN-13 barcode
Published 2018“…The enhanced algorithm was evaluated using a developed prototype which is an Android mobile application of a crowdsourcing data submission based on product price and information, WE+Price, in which, the algorithm was embedded. …”
Get full text
Get full text
Thesis -
7
Fuzzy clustering method and evaluation based on multi criteria decision making technique
Published 2018“…The proposed algorithm is used as a pre-processing method for data followed by Gustafson-Kessel (GK) algorithm to classify credit scoring data. …”
Get full text
Get full text
Get full text
Thesis -
8
False path identification algorithm framework for nonseparable controller-data path circuits
Published 2016“…Proposed framework uses an integrated functional RTL circuit, called assignment decision diagram (ADD) which target at structural-level. …”
Get full text
Get full text
Conference or Workshop Item -
9
Data-driven brain emotional learning-based intelligent controller-PID control of MIMO systems based on a modified safe experimentation dynamics algorithm
Published 2025“…The safe experimentation dynamics algorithm (SEDA) is one such method that optimizes controller parameters using data-driven techniques. …”
Get full text
Get full text
Get full text
Article -
10
Data-driven brain emotional learning-based intelligent controller-PID control of MIMO systems based on a modified safe experimentation dynamics algorithm
Published 2025“…The safe experimentation dynamics algorithm (SEDA) is one such method that optimizes controller parameters using data-driven techniques. …”
Get full text
Get full text
Get full text
Article -
11
Jogging activity recognition using k-NN algorithm
Published 2022“…Jogging activity recognition using the k-NN algorithm is a system that can help users collect information data of user speed movement using speed sensor and give the classification of jogging activity to the user. …”
Get full text
Get full text
Get full text
Academic Exercise -
12
False path identification algorithm framework for nonseparable controller-data path circuits
Published 2017“…Proposed framework uses an integrated functional RTL circuit, called assignment decision diagram (ADD) which target at structural-level. …”
Get full text
Get full text
Article -
13
Input Information in the Approximate Calculation of Two-Dimensional Integral from Highly Oscillating Functions (Irregular Case)
Published 2019“…The estimation of proposed method has been done for the Lipschitz class and class of differentiable functions. The proposed formula is based on the algorithm, which is also effective for a class of discontinuous functions.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
A new variant of black hole algorithm based on multi population and levy flight for clustering problem
Published 2020“…Furthermore, the results revealed a high convergence rate, upon which the algorithm’s performance was subjected to data clustering problems and investigated using six real datasets. …”
Get full text
Get full text
Thesis -
15
Space allocation for examination scheduling using Genetic Algorithm / Alya Kauthar Azman
Published 2025“…Data for the study was collected from university records, and algorithm performance was tested against predefined scheduling criteria. …”
Get full text
Get full text
Thesis -
16
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Article -
17
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Normalized Relational Storage for Extensible Markup Language (XML) Schema
Published 2011“…The algorithm is based on computing a set of minimum covers for all functional dependencies on a universal relation when given XML Functional Dependencies (XFDs) and the schema information. …”
Get full text
Get full text
Journal -
19
Enhancement of Groundwater-Level Prediction Using an Integrated Machine Learning Model Optimized by Whale Algorithm
Published 2023“…The present study attempted to predict groundwater levels (GWL) obtained from precipitation and temperature data based on various temporal delays. The radial basis function (RBF) neural network�whale algorithm (WA) model, the multilayer perception (MLP�WA) model, and genetic programming (GP) were used to predict GWL. …”
Article -
20
On the security of digital signature protocol based on iterated function systems.
Published 2011“…A Diffie-Hellman algorithm is used to improve the security of the proposed protocol by generating the number of iteration that is used to find the attractor of the iterated function system, which is used to calculate the public key and the signature. …”
Get full text
Get full text
Get full text
Article
