Search Results - (( data implication towards algorithm ) OR ( parallel optimization path algorithm ))

  • Showing 1 - 19 results of 19
Refine Results
  1. 1

    Tool path generation of contour parallel based on ant colony optimisation by Abdullah, Haslina, Ramli, Rizauddin, Abd Wahab, Dzuraidah, Abu Qudeiri, Jaber

    Published 2016
    “…An Ant Colony Optimisation (ACO) method is used to optimize the tool path length because of its capability to find the shortest tool path length. …”
    Get full text
    Get full text
    Article
  2. 2
  3. 3
  4. 4

    Restoration planning strategy of transmission system based on optimal energizing time of sectionalizing islands / Dian Najihah Abu Talib by Dian Najihah , Abu Talib

    Published 2019
    “…There are two discrete optimization techniques used in this work, which are the Artificial Bee Colony algorithm and Evolutionary Programming. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    A novel large-bit-size architecture and microarchitecture for the implementation of Superscalar Pipeline VLIW microprocessors by Lee, Weng Fook

    Published 2008
    “…Different adder architectures are investigated for suitability on synthesis implementation of large data bus size adder for efficient usage within the ALU. An adder algorithm using repetitive constructs in a parallel algorithm that allows for efficient and optimal synthesis for large data bus size is proposed as a suitable implementation for the adder within the ALU. …”
    Get full text
    Thesis
  6. 6

    A 'snowflake' geometrical representation for optimised degree six 3-modified chordal ring networks by Chien, Stephen Lim Een, Raja Maamor Shah, Raja Noor Farah Azura, Othman, Mohamed

    Published 2016
    “…A tree visualisation was constructed based on its connectivity to enable the generation of formulae for optimal diameter and average optimal path lengths. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques by Mustafa, Ahmed Sudad

    Published 2017
    “…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Algoritma pendaraban nombor perpuluhan dari perspektif pelajar Tingkatan Satu by Md. Yunus, Aida Suraya

    Published 2001
    “…Identification of students' algorithms has implications towards the teaching and learning activities and forms a basis in planning teaching strategies of multiplication involving decimals for mathematics educators.…”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Online teleoperation of writing manipulator through graphics processing unit based accelerated stereo vision by Abu Raid, Fadi Imad Osman

    Published 2021
    “…These algorithms are then parallelized using Compute Unified Device Architecture CUDA C language to run on Graphics Processing Unit GPU for hardware acceleration. …”
    Get full text
    Get full text
    Thesis
  11. 11

    DC-based PV-powered home energy system by Sabry, Ahmad H.

    Published 2017
    “…A controller based on an algorithm of one time maximum power point (MPP) is proposed to mitigate those losses. …”
    Get full text
    Get full text
    Thesis
  12. 12

    A tool for addressing construct identity in literature reviews and meta-analyses by Larsen, Kai Rune T., Bong, Chih How

    Published 2016
    “…We designed and evaluated the construct identity detector (CID), the first tool with large-scale construct identity detection properties and the first tool that does not require respondent data. Through the adaptation and combination of different natural language processing (NLP) algorithms, six designs were created and evaluated against human expert decisions. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Modified word representation vector based scalar weight for contextual text classification by Abbas Saliimi, Lokman

    Published 2024
    “…Overall, this thesis presents five contributions: the proposed modified word vectors algorithm, the new contextual classification dataset named QCoC, the efficient question-type classifier based on the feed-forward neural network algorithm, the potential transferability of the presented work to other domains, and the practical implications of the presented work towards cases where computational resources are limited or costly.…”
    Get full text
    Get full text
    Thesis
  14. 14

    Cyber hygiene during Covid-19 to avoid cyber attacks by Lee, Yvonne Yi Jin

    Published 2022
    “…Cyber security expenses have increased over the past decade while massive infringements of data and data leaks have also risen. In addition, we need to practice the best cyber hygiene behaviors in order to avoid cyber-attacks like phishing, data loss, and others. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15

    Determinants of intention to pay Zakat on employment income by civil servants in Kano State, Nigeria by Farouk, Abubakar Umar

    Published 2018
    “…By implication, the findings of this study challenged the policy makers of the state of Kano to direct efforts towards improving these determinants for stronger intention to comply and as well dared scholars of Kano state religious department lo conduct further confirmatory empirical research in the area of study. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Farm credit, farmland, farm infrastructure and agricultural output in Kano State, Nigeria : the moderating effect of murabahah finance by Mohammed, Ahmed Ibrahim

    Published 2017
    “…The study employed systematic sampling technique in data collection, with a sample size of 764 farmers. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    The influence of Robo-advisory services on Malaysia university student’s investment intention by Tan, Yung Hui, Lim, Jia Eng, Lim, Keh Xin, Zeng, Yi

    Published 2025
    “…The emergence of robo-advisory services has transformed the landscape of investment by offering automated, algorithm-driven financial planning with minimal human intervention. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18

    Development of gesture-controlled robotic arm for upper limb hemiplegia therapy by Wan Azlan, Wan Norliyana

    Published 2022
    “…In conclusion, these findings have significant implications for the understanding of hand recognition application towards robotic-based upper limb assistive and rehabilitation procedures.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Government policy as a key moderator to contractors’ risk attitudes among Malaysian construction companies by Taofeeq, D. M., Adeleke, A. Q., Lee, Chia Kuang

    Published 2020
    “…The study investigated G7 contractors in the Malaysian construction industry. Data were collected through the use of a questionnaire. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article