Search Results - (( data evaluation window algorithm ) OR ( parallel optimization path algorithm ))

Refine Results
  1. 1

    Online teleoperation of writing manipulator through graphics processing unit based accelerated stereo vision by Abu Raid, Fadi Imad Osman

    Published 2021
    “…To deal with these issues, adaptive sampling algorithm is applied to the data points to adhere to the manipulators speed constraints. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Tool path generation of contour parallel based on ant colony optimisation by Abdullah, Haslina, Ramli, Rizauddin, Abd Wahab, Dzuraidah, Abu Qudeiri, Jaber

    Published 2016
    “…An Ant Colony Optimisation (ACO) method is used to optimize the tool path length because of its capability to find the shortest tool path length. …”
    Get full text
    Get full text
    Article
  3. 3
  4. 4
  5. 5

    Towards lowering computational power in IoT systems: Clustering algorithm for high-dimensional data stream using entropy window reduction by Alkawsi G., Al-amri R., Baashar Y., Ghorashi S., Alabdulkreem E., Kiong Tiong S.

    Published 2024
    “…Lately, a fully online buffer-based clustering algorithm for handling evolving data streams (BOCEDS) was developed. …”
    Article
  6. 6

    Restoration planning strategy of transmission system based on optimal energizing time of sectionalizing islands / Dian Najihah Abu Talib by Dian Najihah , Abu Talib

    Published 2019
    “…There are two discrete optimization techniques used in this work, which are the Artificial Bee Colony algorithm and Evolutionary Programming. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Examining the round trip time and packet length effect on window size by using the Cuckoo search algorithm by Abubakar, Adamu, Chiroma, Haruna, Khan, Abdullah, Mohamed, Elbaraa Eldaw Elnour

    Published 2016
    “…Crucial to this is the width of the sliding window. This study utilized raw data from network traffic and built a Neural Network (NN) model trained with the Cuckoo Search (CS) algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Efficient management of Top-k queries over Uncertain Data Streams with dynamic Sliding Window Model by Raja Wahab, Raja Azhan Syah

    Published 2024
    “…The algorithm development combines the frameworks from Phases 1 to 3, evaluating real and synthetic datasets. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network by Abu-Khadrah, Ahmed Ismail Mohammad

    Published 2017
    “…The OPNET simulator and the mathematical model were used to evaluate the performance for the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    CC_TRS: continuous clustering of trajectory stream data based on micro cluster life by Abdulrazzaq, Musaab Riyadh, Mustapha, Norwati, Sulaiman, Md. Nasir, Mohd Sharef, Nurfadhlina

    Published 2017
    “…For offline phase, a density based clustering approach is used to generate macro clusters depending on temporal micro clusters. The evaluation of the proposed algorithm on real data sets shows the efficiency and the effectiveness of the proposed algorithm and proved it is efficient alternative to time window technique.…”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Comparison of malware detection model using supervised machine learning algorithms / Syamir Mohd Shahirudin by Mohd Shahirudin, Syamir

    Published 2022
    “…The Windows malware dataset has been trained and tested by these three machine learning algorithms to get the percentage detection accuracy. …”
    Get full text
    Get full text
    Student Project
  12. 12

    The Use and Evaluation of Split-Window Techniques for NOAA/AVHRR Surface Temperature Extraction over Different Surface Covers: case study (Perak Tengah & Manjong) area, Malays... by Hassaballa A., Abdul-Haleem, Matori , Abdul Nasir

    Published 2011
    “…The brightness temperature from bands 4&5 was then used with ε to derive Ts using three different split window algorithms. The results showed a good correlation between satellite estimated Ts and measured Ta especially when Uliveri algorithm was applied over the agricultural area with R reaching 87%. …”
    Get full text
    Get full text
    Article
  13. 13

    A novel large-bit-size architecture and microarchitecture for the implementation of Superscalar Pipeline VLIW microprocessors by Lee, Weng Fook

    Published 2008
    “…Different adder architectures are investigated for suitability on synthesis implementation of large data bus size adder for efficient usage within the ALU. An adder algorithm using repetitive constructs in a parallel algorithm that allows for efficient and optimal synthesis for large data bus size is proposed as a suitable implementation for the adder within the ALU. …”
    Get full text
    Thesis
  14. 14
  15. 15

    Framework for stream clustering of trajectories based on temporal micro clustering technique by Abdulrazzaq, Musaab Riyadh

    Published 2018
    “…However, it is a vital process for many applications such as traffic management, studying of animal behavior, and weather forecasting. Many existing algorithms for stream clustering of trajectory stream data exploit the time window technique which partition trajectory stream data into time-bins and cluster the segments in each timebin separately. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Damage visualization based on frequency shift of single-mode ultrasound-guided wavefield by Shahrim, Muhamad Azim, Harmin, Mohammad Yazdi, Romli, Fairuz Izzuddin, Chia, Chen Ciang, Jung-Ryul, Lee

    Published 2022
    “…Last but not least, the comparison of accuracy between frequency analysis algorithm and variable time window amplitude mapping (VTWAM) algorithm is performed. …”
    Get full text
    Get full text
    Article
  17. 17

    A voting-based hybrid machine learning approach for fraudulent financial data classification / Kuldeep Kaur Ragbir Singh by Kuldeep Kaur , Ragbir Singh

    Published 2019
    “…The voting-based hybrid approach consisting of various machine learning models with the ability to tackle issues related to missing and imbalanced data is then developed. To evaluate the efficacy of the models, publicly available financial and credit card data sets are evaluated. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Non-fiducial based electrocardiogram biometrics with kernel methods by Hejazi, Maryamsadat

    Published 2017
    “…The highest window and subject predictive accuracies achieved are approximately 92% and 77% on KPCA data set with the lowest biometric error and overfitting. …”
    Get full text
    Get full text
    Thesis
  19. 19

    WBEC: A web browsers evidence collection toolkit for web browsers usage in Windows 10 by Rayman, Dafiqah Mior, Asmawi, Aziah, Mohd Ariffin, Noor Afiza

    Published 2022
    “…The amount of data type evidence collections and security measures to secure the integrity of evidence collected are measured by evaluating available tools, developing a proof-of-concept toolkit, and comparingfunctioning tools. …”
    Get full text
    Get full text
    Article
  20. 20

    An improved pixel-based and region-based approach for urban growth classification algorithms / Nur Laila Ab Ghani by Ab Ghani, Nur Laila

    Published 2015
    “…The new urban areas identified from the binary images are classified to their urban growth forms using moving window, topological relation border length and landscape expansion index algorithms. …”
    Get full text
    Get full text
    Thesis