Search Results - (( data evaluations _ algorithm ) OR ( parallel optimization path algorithm ))
Search alternatives:
- parallel optimization »
- optimization path »
- data evaluations »
- path algorithm »
-
1
Tool path generation of contour parallel based on ant colony optimisation
Published 2016“…An Ant Colony Optimisation (ACO) method is used to optimize the tool path length because of its capability to find the shortest tool path length. …”
Get full text
Get full text
Article -
2
Online teleoperation of writing manipulator through graphics processing unit based accelerated stereo vision
Published 2021“…To deal with these issues, adaptive sampling algorithm is applied to the data points to adhere to the manipulators speed constraints. …”
Get full text
Get full text
Thesis -
3
Minimizing machining airtime motion with an ant colony algorithm
Published 2016Get full text
Get full text
Article -
4
-
5
DC-based PV-powered home energy system
Published 2017“…For more accurate mathematical representation for the empirical outcome power data, a mathematical model based on Bode Equations and Vector Fitting algorithm has been proposed to govern the load power profile of the proposed system. …”
Get full text
Get full text
Thesis -
6
Restoration planning strategy of transmission system based on optimal energizing time of sectionalizing islands / Dian Najihah Abu Talib
Published 2019“…There are two discrete optimization techniques used in this work, which are the Artificial Bee Colony algorithm and Evolutionary Programming. …”
Get full text
Get full text
Get full text
Thesis -
7
A novel large-bit-size architecture and microarchitecture for the implementation of Superscalar Pipeline VLIW microprocessors
Published 2008“…Different adder architectures are investigated for suitability on synthesis implementation of large data bus size adder for efficient usage within the ALU. An adder algorithm using repetitive constructs in a parallel algorithm that allows for efficient and optimal synthesis for large data bus size is proposed as a suitable implementation for the adder within the ALU. …”
Get full text
Thesis -
8
A 'snowflake' geometrical representation for optimised degree six 3-modified chordal ring networks
Published 2016“…A tree visualisation was constructed based on its connectivity to enable the generation of formulae for optimal diameter and average optimal path lengths. …”
Get full text
Get full text
Conference or Workshop Item -
9
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
Get full text
Get full text
Get full text
Thesis -
10
Evaluating power efficient algorithms for efficiency and carbon emissions in cloud data centers: a review
Published 2015“…The three algorithms are evaluated for performance using three parameters; power efficiency, cost effectiveness, and amount of CO2 emissions. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
11
Performance evaluation for different data encryption algorithms on wireless sensor network (WSN)
Published 2018“…The performance metrics studied are the energy dissipation, execution time, and size of encryption data. The results of evaluation AES, SF and SIT algorithms in terms of encrypted data size (bytes) showed that, the SIT algorithm produce the lowest size for all encrypted Images which is below 90250bytes. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream
Published 2023“…The results indicate that the AGMB algorithm outperformed existing benchmark algorithms in terms of predefined evaluation criteria with an overall 72% accuracy compared to benchmark algorithms which is 11 % only. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Optimizing Cloud Storage Costs: Introducing the Pre-Evaluation-Based Cost Optimization (PECSCO) Mechanism
Published 2025Subjects:Conference paper -
14
A Comparative Study Of Blockchain Algorithms For Non-Fungible Token
Published 2023“…In this research, there will be some selected algorithms, which is Proof-of-Work and Proof-of-Stakes from open resource and modified to the suitable testing criteria to evaluate valid and sufficient data for data visualization. …”
Get full text
Get full text
Undergraduates Project Papers -
15
Performance evaluation of caching placement algorithms in named data network for video on demand service
Published 2016“…The purpose of this study is to evaluate the performance of caching placement algorithms (LCD, LCE, Prob, Pprob, Cross, Centrality, and Rand) in Named Data Network (NDN) for Video on Demand (VoD). …”
Get full text
Get full text
Get full text
Thesis -
16
Analysis of string matching compression algorithms
Published 2008“…Thus, this study incorporates compression to main memory in order to fully utilize its resources and improve performance of data access. This project evaluates the performance of the compression algorithms in order to increase the performance of memory access. …”
Get full text
Get full text
Article -
17
Data depublication using : Hashing algorithm / Naimah Nayan
Published 2019“…The recommendation for future work is to evaluate various type of data and different type of hashing algorithm.…”
Get full text
Get full text
Thesis -
18
Case Slicing Technique for Feature Selection
Published 2004“…Since the 1960s, many algorithms for data classification have been proposed. …”
Get full text
Get full text
Thesis -
19
-
20
Multistep forecasting for highly volatile data using new algorithm of Box-Jenkins and GARCH
Published 2018“…In evaluating the performance of the multistep ahead forecast, the proposed algorithm is employed to daily world gold price series of 5-year data. …”
Get full text
Get full text
Conference or Workshop Item
