Search Results - (( data normalization research algorithm ) OR ( parallel optimization path algorithm ))
Search alternatives:
- normalization research »
- parallel optimization »
- data normalization »
- research algorithm »
- optimization path »
- path algorithm »
-
1
Tool path generation of contour parallel based on ant colony optimisation
Published 2016“…An Ant Colony Optimisation (ACO) method is used to optimize the tool path length because of its capability to find the shortest tool path length. …”
Get full text
Get full text
Article -
2
Minimizing machining airtime motion with an ant colony algorithm
Published 2016Get full text
Get full text
Article -
3
-
4
Restoration planning strategy of transmission system based on optimal energizing time of sectionalizing islands / Dian Najihah Abu Talib
Published 2019“…There are two discrete optimization techniques used in this work, which are the Artificial Bee Colony algorithm and Evolutionary Programming. …”
Get full text
Get full text
Get full text
Thesis -
5
A novel large-bit-size architecture and microarchitecture for the implementation of Superscalar Pipeline VLIW microprocessors
Published 2008“…Different adder architectures are investigated for suitability on synthesis implementation of large data bus size adder for efficient usage within the ALU. An adder algorithm using repetitive constructs in a parallel algorithm that allows for efficient and optimal synthesis for large data bus size is proposed as a suitable implementation for the adder within the ALU. …”
Get full text
Thesis -
6
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
7
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Monograph -
8
Algorithm for calculation of cephalometric soft tissue facial traits
Published 2007“…The source data used to get 3D digital models of human soft tissues include CT data and 3D laser scanner data. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
An alternative approach to normal parameter reduction algorithms for decision making using a soft set theory / Sani Danjuma
Published 2017“…In addition, the algorithm was relatively easy to understand compare to the state of the art of normal parameter reduction algorithm. …”
Get full text
Get full text
Get full text
Thesis -
10
Electroencephalography Simulation Hardware for Realistic Seizure, Preseizure and Normal Mode Signal Generation
Published 2015“…Such a simulator will be very helpful in EEG related research since all the initial algorithms can be tuned to the controlled data first before going to the actual human subjects. …”
Get full text
Get full text
Article -
11
Classification of Cardiac Disorders Based on Electrocardiogram Data with Fuzzy Cognitive Map (FCM) Algorithm Approach
Published 2021“…Meanwhile, the re�sult of abnormal heart convergence process has the lowest convergence value of 0.49 and the highest convergence value of 0.87. This research contributes to the world of health, where we classify the Electrocardiogram (ECG) data, so that it can classify abnormal and normal cardiac disorders using the Fuzzy Cognitive Map (FCM) algorithm.…”
Get full text
Get full text
Conference or Workshop Item -
12
A 'snowflake' geometrical representation for optimised degree six 3-modified chordal ring networks
Published 2016“…A tree visualisation was constructed based on its connectivity to enable the generation of formulae for optimal diameter and average optimal path lengths. …”
Get full text
Get full text
Conference or Workshop Item -
13
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
Get full text
Get full text
Get full text
Thesis -
14
-
15
-
16
EEG Simulation Hardware for Realistic Seizure, Preseizure and Normal Mode Signal Generation
Published 2015“…Such a simulator will be very helpful in EEG related research since all the initial algorithms can be tuned to the controlled data first before going to the actual human subjects. …”
Get full text
Get full text
Citation Index Journal -
17
Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer
Published 2023“…We built three algorithms to detect anomalies in the streaming data autonomously. …”
Get full text
Get full text
Thesis -
18
Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream
Published 2023“…Existing clustering algorithms for outlier detection encounter significant challenges due to insufficient data pre-processing methods and the absence of a suitable data summarization framework for effective data stream clustering. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Improving Channel Assignment for Vehicular Ad-hoc Sensor Network in Disaster Management System
Published 2024“…Moreover, an average of 22.91% for LTE-AIC with respect to normal LTE-A and 38.63% compared to LTE for high data rate. …”
Get full text
Get full text
Get full text
Thesis -
20
An improved recommender system based on normalization of matrix factorization and collaborative filtering algorithms
Published 2015“…Therefore, this research is dedicated to combining the normalization technique with neighborhood models (CF and MF) to produce CF+N (collaborative filtering and normalization) and MF+N (matrix factorization and normalization). …”
Get full text
Get full text
Thesis
