Search Results - (( data deduction model algorithm ) OR ( parallel optimization path algorithm ))

  • Showing 1 - 15 results of 15
Refine Results
  1. 1

    Tool path generation of contour parallel based on ant colony optimisation by Abdullah, Haslina, Ramli, Rizauddin, Abd Wahab, Dzuraidah, Abu Qudeiri, Jaber

    Published 2016
    “…An Ant Colony Optimisation (ACO) method is used to optimize the tool path length because of its capability to find the shortest tool path length. …”
    Get full text
    Get full text
    Article
  2. 2
  3. 3
  4. 4

    Restoration planning strategy of transmission system based on optimal energizing time of sectionalizing islands / Dian Najihah Abu Talib by Dian Najihah , Abu Talib

    Published 2019
    “…There are two discrete optimization techniques used in this work, which are the Artificial Bee Colony algorithm and Evolutionary Programming. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    A novel large-bit-size architecture and microarchitecture for the implementation of Superscalar Pipeline VLIW microprocessors by Lee, Weng Fook

    Published 2008
    “…Different adder architectures are investigated for suitability on synthesis implementation of large data bus size adder for efficient usage within the ALU. An adder algorithm using repetitive constructs in a parallel algorithm that allows for efficient and optimal synthesis for large data bus size is proposed as a suitable implementation for the adder within the ALU. …”
    Get full text
    Thesis
  6. 6

    Prediction of novel doping agent through the integration of chemical and biological data using in silico method by Mohd Rosman, Nurul Ain

    Published 2016
    “…The deductive model built can then be used to predict potential protein targets for a novel compound, given its chemical structure. …”
    Get full text
    Get full text
    Student Project
  7. 7

    A 'snowflake' geometrical representation for optimised degree six 3-modified chordal ring networks by Chien, Stephen Lim Een, Raja Maamor Shah, Raja Noor Farah Azura, Othman, Mohamed

    Published 2016
    “…A tree visualisation was constructed based on its connectivity to enable the generation of formulae for optimal diameter and average optimal path lengths. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques by Mustafa, Ahmed Sudad

    Published 2017
    “…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata by Hamdi, Ayman Majid

    Published 2019
    “…Lastly, KD-3D-CA Block cipher is more complex and it outperforms AES with more than 25% for different key sizes. Deductively, the proposed KD-3D-CA block cipher algorithm is more secure than other block cipher algorithms and can be implemented for data encryption and decryption.…”
    Get full text
    Get full text
    Thesis
  10. 10

    Online teleoperation of writing manipulator through graphics processing unit based accelerated stereo vision by Abu Raid, Fadi Imad Osman

    Published 2021
    “…These algorithms are then parallelized using Compute Unified Device Architecture CUDA C language to run on Graphics Processing Unit GPU for hardware acceleration. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Heartbeat Anomaly Detection Method Based on Electrocardiogram using Improved Certainty Cognitive Map by Sumiati, .

    Published 2023
    “…The second problem lies in the weakness of CM, namely cognitive maps do not model certainty in variables but only form deductive reasoning. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Firefly-inspired time synchronization mechanism for self-organizing energy efficient wireless sensor networks by Al-Mekhlafi, Zeyad Ghaleb Aqlan

    Published 2017
    “…Specifically, the TWPCO mechanism showed superior performance compared to other mechanisms with a deduction on the total energy consumption by 25 %, while improving the performance by 13 % in terms of data gathering. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Depth value approximation of 2D complex-shape objects for 3D modelling using optical flow and trigonometry by Ng, Seng Beng

    Published 2015
    “…Colour information of the feature points can be extracted as well. Data enhancement algorithms were implemented to perform noise filtering and inverse perspective mapping (IPM). …”
    Get full text
    Get full text
    Thesis
  14. 14

    Audience Responses to Newspaper Coverage of Floods in China: Victims Versus Onlookers by Ning, Li, Ting, Su Hie

    Published 2026
    “…The findings show that both victims and onlookers are aware of media control and the role of big data algorithms to push selected national news but still trust newspapers over social media as sources of information during flood crises.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    DC-based PV-powered home energy system by Sabry, Ahmad H.

    Published 2017
    “…A controller based on an algorithm of one time maximum power point (MPP) is proposed to mitigate those losses. …”
    Get full text
    Get full text
    Thesis