Search Results - (( data distribution program algorithm ) OR ( parallel optimization path algorithm ))
Search alternatives:
- parallel optimization »
- distribution program »
- data distribution »
- optimization path »
- path algorithm »
-
1
Tool path generation of contour parallel based on ant colony optimisation
Published 2016“…An Ant Colony Optimisation (ACO) method is used to optimize the tool path length because of its capability to find the shortest tool path length. …”
Get full text
Get full text
Article -
2
Minimizing machining airtime motion with an ant colony algorithm
Published 2016Get full text
Get full text
Article -
3
DC-based PV-powered home energy system
Published 2017“…For more accurate mathematical representation for the empirical outcome power data, a mathematical model based on Bode Equations and Vector Fitting algorithm has been proposed to govern the load power profile of the proposed system. …”
Get full text
Get full text
Thesis -
4
-
5
Restoration planning strategy of transmission system based on optimal energizing time of sectionalizing islands / Dian Najihah Abu Talib
Published 2019“…There are two discrete optimization techniques used in this work, which are the Artificial Bee Colony algorithm and Evolutionary Programming. …”
Get full text
Get full text
Get full text
Thesis -
6
Satisfiable Integer Programming Algorithm On Distributed Inter Process Communication (SIP-DIPC)
Published 2019“…Data Analytics is a superset to Data Mining. Data mining algorithm is getting popular support in recent development of Big Data. …”
Get full text
Get full text
Get full text
Article -
7
A novel large-bit-size architecture and microarchitecture for the implementation of Superscalar Pipeline VLIW microprocessors
Published 2008“…Different adder architectures are investigated for suitability on synthesis implementation of large data bus size adder for efficient usage within the ALU. An adder algorithm using repetitive constructs in a parallel algorithm that allows for efficient and optimal synthesis for large data bus size is proposed as a suitable implementation for the adder within the ALU. …”
Get full text
Thesis -
8
Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari
Published 2017“…AES is a data encryption technique that exist in the world with as currently the most secured algorithms. …”
Get full text
Get full text
Thesis -
9
Web based applications for energy management system incorporated network reconfiguration using genetic algorithm / Wan Adnan Wan
Published 2006“…The development on Web Application system uses An ActiveX technology approach. The Genetic Algorithm Based Network Reconfiguration Technique for loss minimization in the UiTM Distribution System is also proposed based on general combinatorial optimization algorithm. …”
Get full text
Get full text
Thesis -
10
Investigation on the dynamic of computation of semi autonomous evolutionary computation for syntactic optimization of a set of programming codes
Published 2007“…In order to have a realistic characteristic of a parallel computing engine, a Rocks based computer cluster was built and used for the test. Genetic Algorithm as one of the Evolutionary Computation method improve the execution of parallel programming codes by optimizing the number of processors and the distribution of data. …”
Get full text
Get full text
Research Report -
11
Network reconfiguration and control for loss reduction using genetic algorithm
Published 2010“…All the data for 18-bus system test are taken from previous work, and all the data for 49-bus system test are taken from an existing Iraqi distribution network. …”
Get full text
Get full text
Thesis -
12
A 'snowflake' geometrical representation for optimised degree six 3-modified chordal ring networks
Published 2016“…A tree visualisation was constructed based on its connectivity to enable the generation of formulae for optimal diameter and average optimal path lengths. …”
Get full text
Get full text
Conference or Workshop Item -
13
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
Get full text
Get full text
Get full text
Thesis -
14
A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem
Published 2016“…However, by changing the distribution of both classes, the original classes distribution that are followed by that particular data will be violated. …”
Get full text
Get full text
Get full text
Thesis -
15
-
16
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Map Reduce is one common programming model to process and handle a large amount of data, specifically in big data analysis. …”
Get full text
Get full text
Conference or Workshop Item -
17
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Map Reduce is one common programming model to process and handle a large amount of data, specifically in big data analysis. …”
Get full text
Get full text
Conference or Workshop Item -
18
Budget visualizer using circle packing technique / Nursyahira Zulkeply
Published 2019“…This algorithm can be reusable to visualize any other financial data in hierarchy structure.…”
Get full text
Get full text
Thesis -
19
Mapreduce algorithm for weather dataset
Published 2017“…This original dataset is stored in Hadoop Distributed File System. Next, MapReduce Algorithm is developed using Java programming. …”
Get full text
Get full text
Thesis -
20
Automatic filtering of far outliers in multibeam echo sounding dataset using robust detection algorithms
Published 2005“…Bathymetric data collections using multibeam echo sounder (MBES) have led to increasing data rates and densities. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
