Search Results - (( based replication _ algorithm ) OR ( some application using (algorithmic OR algorithms) ))*
Search alternatives:
-
1
Dynamic replication algorithm in data grid: Survey
Published 2008“…A dynamic replication model based on mathematical concepts is proposed. …”
Get full text
Get full text
Get full text
Book Section -
2
Optimization of mobile robot path planning in semi-dynamic environment using genetic algorithm
Published 2023“…Thus, this thesis aims to develop a mobile robot for industrial applications by leveraging a genetic algorithm (GA). The main objective is to formulate an improved path planning for mobile robots based on GA considering the different obstacle percentage of each environment in the area. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
A framework for automatic modelling of survival using fuzzy inference.
Published 2012“…After the initialisation of the fuzzy inference structure, the replication data (until time to event) will be subject to be trained using the gradient descent and nonnegative least square algorithm to estimate the conditional event probability. …”
Get full text
Get full text
Conference or Workshop Item -
4
Relationship based replication algorithm for data grid
Published 2014“…The Relationship based Replication algorithm aims to improve the Data Grid performance by reducing the job execution time, bandwidth and storage usage.The RBR was realized using a network simulation (OptorSim) and experiment results revealed that it offers better performance than existing replication algorithms.…”
Get full text
Get full text
Monograph -
5
-
6
-
7
Three-term backpropagation algorithm for classification problem
Published 2006“…Standard Backpropagation Algorithm (BP) is a widely used algorithm in training Neural Network that is proven to be very successful in many diverse application. …”
Get full text
Get full text
Thesis -
8
Cryptography: A New Approach of Classical Hill Cipher
Published 2013Get full text
Get full text
Article -
9
Cluster Analysis of Data Points using Partitioning and Probabilistic Model-based Algorithms
Published 2014“…Experiments were conducted using k-means, k-medoids and EM-algorithm. The study implements each algorithm using RapidMiner Software and the results generated was validated for correctness in accordance to the concept of external criteria method. …”
Get full text
Get full text
Get full text
Article -
10
The fusion of particle swarm optimization (PSO) and interior point method (IPM) as cooperative movement control algorithm in Swarm Robotics / Dada Emmanuel Gbenga
Published 2016“…It is demonstrated in the literature that methods that hybridize PSO and some other optimisation algorithm have a better performance over the standard PSO algorithm. …”
Get full text
Get full text
Thesis -
11
Neural Network Training Using Hybrid Particle-move Artificial Bee Colony Algorithm for Pattern Classification
Published 2017“…Traditional neural networks algorithms such as Back Propagation (BP) were used for ANNT, but they have some drawbacks such as computational complexity and getting trapped in the local minima. …”
Get full text
Get full text
Get full text
Article -
12
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
Get full text
Get full text
Thesis -
13
VITILIGO LESION ASSESSMENT TOOL ON SMARTPHONE
Published 2013“…ICA algorithm does vast computations thus; ICA algorithm is used to improve segmentation performance. …”
Get full text
Get full text
Final Year Project -
14
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
-
16
Feature selection to enhance android malware detection using modified term frequency-inverse document frequency (MTF-IDF)
Published 2019“…The TF-IDF algorithm is used to filter Android features filtered before detection process. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Neural network training using hybrid particle-move artificial bee colony algorithm for pattern classification
Published 2017“…By optimizing the training of the neural networks using optimal weight set, better results can be obtained by the neural networks.Traditional neural networks algorithms such as Back Propagation (BP) were used for ANNT, but they have some drawbacks such as computational complexity and getting trapped in the local minima.Therefore, evolutionary algorithms like the Swarm Intelligence (SI) algorithms have been employed in ANNT to overcome such issues.Artificial Bees Colony (ABC) optimization algorithm is one of the competitive algorithms in the SI algorithms group. …”
Get full text
Get full text
Get full text
Article -
18
Enhanced Clustering Algorithms For Gray-Scale Image Segmentation
Published 2012Get full text
Get full text
Thesis -
19
Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection
Published 2022“…The proposed EBGWO algorithm can be used for FS in anomaly detection tasks that involve any dataset size from various application domains.…”
Get full text
Get full text
Thesis -
20
Wind farm reactive power optimization by using imperialist competitive algorithm
Published 2013“…In this paper, the reactive power consumption of a wind turbine is optimized by using (ICA) method. To illustrate the application of the method, a wind farm with some uncertainties is provided. …”
Get full text
Get full text
Conference or Workshop Item
