Search Results - (( data integration among algorithm ) OR ( savvy simulation optimization algorithm ))
Search alternatives:
- integration among »
- data integration »
- savvy simulation »
- among algorithm »
-
1
Hybrid Spatial-Artificial Intelligence Approach for Renewable Energy Sources Sites Identification and Integration in Sarawak State
Published 2022“…The second phase of the research work is to integrate the RES sites. TSP-GA algorithm is applied to generate the transmission line routing among the RES sites with minimum total distance. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Development of an algorithm for correlation of aircraft positioning data from radar and ADS-B sensors / Koh Che Hun
Published 2019“…To fuse data from different sensors, the correlation algorithm is vital. …”
Get full text
Get full text
Get full text
Thesis -
3
Fsm-Based Enhanced March C- Algorithm For Memory Built-In Self-Test
Published 2017“…Besides that, the enhanced MARCH C- algorithm can structurally identify the fault types and differentiate among the behavioural faults (Data Retention Faults) and common memory faults as well as among Stuck-At Fault and Transition Fault. …”
Get full text
Get full text
Thesis -
4
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Published 2017“…Data integrity must be ensured before and after the data transmission. …”
Get full text
Get full text
Thesis -
5
An Integrated Principal Component Analysis And Weighted Apriori-T Algorithm For Imbalanced Data Root Cause Analysis
Published 2016“…A semiconductor manufacturing case study with Work In Progress data and true alarm data is used to proof the proposed algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Integration of spectroscopy and chemometric analysis for food authentication: a review
Published 2025“…The review discusses the emerging trend of integrating spectroscopy into real-time authentication systems, particularly in the application of data fusion and deep learning techniques.…”
Get full text
Get full text
Get full text
Article -
7
-
8
Pembangunan model regresi poisson sifar-melambung berintegrasi dalam biostatistik
Published 2018“…This research also emphasizes the development methodology of data analysis. The data gathered involved two major cases studies of data from patients with Thalassemia among children and the patients with dental caries problems. …”
Get full text
Get full text
Thesis -
9
Optimization of supply chain management by simulation based RFID with XBEE Network
Published 2015“…However, RFID reader is an expensive and has limited data transmission range. It alone cannot transmit data to the main server. …”
Get full text
Get full text
Get full text
Thesis -
10
Fair Traffic Scheduling and Shaping Algorithms for Diffserv Networks
Published 2006“…The interaction of different traffic type flows in a DiffServ networks using the proposed integration model between FWFQ and the dual token bucket shaper algorithm is analyzed. …”
Get full text
Get full text
Thesis -
11
Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase
Published 2007“…The proposed algorithm performs the encryption of the data and the calculation of the MAC in parallel. …”
Get full text
Get full text
Conference or Workshop Item -
12
Improving security performance with parallel crypto operations in SSL bulk data transfer
Published 2009“…The proposed algorithm performs the encryption of the data and the calculation of the MAC in parallel. …”
Get full text
Get full text
Get full text
Article -
13
Comparative study of machine learning algorithms in data classification
Published 2025“…In many different fields, data mining, the process of identifying significant patterns in historical data, is essential to decision-making. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Extended multiple models selection algorithms based on iterative feasible generalized least squares (IFGLS) and expectation-maximization (EM) algorithm
Published 2019“…The empirical results for both algorithms performed well as compared to other models selection procedures, particularly using WQI data where the sample size is bigger and has good quality data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
A conceptual framework for multi-objective optimization of building performance: Integrating intelligent algorithms, simulation tools, and climate adaptation
Published 2025“…The framework provides a systematic, data-driven approach to address trade-offs among energy efficiency, thermal comfort, and indoor air quality. …”
Get full text
Get full text
Get full text
Article -
16
Water Quality Evaluation and Analysis by Integrating Statistical and Machine Learning Approaches
Published 2026journal::journal article -
17
A case study of microarray breast cancer classification using machine learning algorithms with grid search cross validation
Published 2023“…Grid search cross validation (CV) is applied for hyperparameter tuning of the algorithms. The result shows that the tuned SVM is best among the tested algorithms with accuracy of 97.78%. …”
Get full text
Get full text
Get full text
Article -
18
Sure (EM)-Autometrics: An Automated Model Selection Procedure with Expectation Maximization Algorithm Estimation Method (S/O 14925)
Published 2021“…Hence, this study concentrates on an automated model selection procedure for the SURE model by integrating the expectation-maximization (EM) algorithm estimation method, named SURE(EM)-Autometrics. …”
Get full text
Get full text
Monograph -
19
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…There are various hash functions, including Message-Digest 5 (MD5), RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160), Secure Hash Algorithm 1 (SHA-1), and Secure Hash Algorithm 256 (SHA-256), among others. …”
Get full text
Get full text
Get full text
Article -
20
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…There are various hash functions, including Message-Digest 5 (MD5), RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160), Secure Hash Algorithm 1 (SHA-1), and Secure Hash Algorithm 256 (SHA-256), among others. …”
Get full text
Get full text
Get full text
Get full text
Article
