Search Results - (( data selection methods algorithm ) OR ( parallel operations using algorithm ))
Search alternatives:
- selection methods »
- methods algorithm »
- operations using »
- using algorithm »
- data selection »
-
1
Parallel algorithms for numerical simulations of EHD ion-drag micropump on distributed parallel computing systems
Published 2014“…A data parallel algorithm (DPA-EHD) is designed and implemented for the EHD equations. …”
Get full text
Get full text
Thesis -
2
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
3
Web based personalized university timetable for UiTM students using genetic algorithm / Mohd Radhi Fauzan Jamli and Ahmad Firdaus Ahmad Fadzil
Published 2024“…Future work entails enhancing system robustness through comprehensive contingency planning, real-time data integration, and algorithmic optimization, with a focus on refining the genetic algorithm and exploring parallel processing techniques to further enhance efficiency and scalability.…”
Get full text
Get full text
Get full text
Article -
4
Twofold Integer Programming Model for Improving Rough Set Classification Accuracy in Data Mining.
Published 2005“…The accuracy for rules and classification resulted from the TIP method are compared with other methods such as Standard Integer Programming (SIP) and Decision Related Integer Programming (DRIP) from Rough Set, Genetic Algorithm (GA), Johnson reducer, HoltelR method, Multiple Regression (MR), Neural Network (NN), Induction of Decision Tree Algorithm (ID3) and Base Learning Algorithm (C4.5); all other classifiers that are mostly used in the classification tasks. …”
Get full text
Get full text
Thesis -
5
Hybrid harmony search-artificial intelligence models in credit scoring
Published 2019“…To utilize the SVM credit model, features selection is conducted simultaneously with hyperparameters tuning using a HS so that the attributes can be focused down to the reduced features for explanation. …”
Get full text
Get full text
Thesis -
6
Enhancing performance of XTS cryptography mode of operation using parallel design
Published 2009“…In addition, the parallel XTS mode was also simulated using Twofish and RC6 encryption algorithms. …”
Get full text
Get full text
Thesis -
7
A parallel XTS encryption mode of operation
Published 2009“…In this paper, the newly standardized IEEE XTS encryption mode of operation for storage encryption (P1619 standard) has been implemented using parallel design. …”
Get full text
Get full text
Conference or Workshop Item -
8
Implementation of a parallel XTS encryption mode of operation
Published 2014“…In this paper, the IEEE XTS encryption mode of operation for storage encryption (P1619 standard) has been implemented using parallel design. …”
Get full text
Get full text
Get full text
Article -
9
Parallel matrix-multiplication algorithm on network of workstations
Published 2004“…We discuss matrix-multiplication algorithm and highlight one of the parallel matrix--multiplication algorithms. …”
Get full text
Get full text
Get full text
Article -
10
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…Based on the performance simulations, the new parallel algorithm gained speedup of 1.74 with 85% efficiency over the current sequential algorithm. …”
Get full text
Get full text
Thesis -
11
Parallelization of noise reduction algorithm for seismic data on a beowulf cluster
Published 2010“…The parallel algorithm was developed using C language with the utilization of the Message Passing Interface (MPI) library. …”
Get full text
Get full text
Citation Index Journal -
12
Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase
Published 2007“…Based on the performance simulations, the new parallel algorithm gained speedup of 1.74 with 85% efficiency over the current (sequential) algorithm.…”
Get full text
Get full text
Conference or Workshop Item -
13
Improving security performance with parallel crypto operations in SSL bulk data transfer
Published 2009“…Based on the performance simulations, the new parallel algorithm gained speedup of 1.74 with 85% efficiency over the sequential (current) algorithm.…”
Get full text
Get full text
Get full text
Article -
14
A review of genetic algorithms and parallel genetic algorithms on Graphics Processing Unit (GPU)
Published 2013“…One of the popular ways to speed up the processing time was by running them as parallel. The idea of parallel GAs may refer to an algorithm that works by dividing large problem into smaller tasks. …”
Get full text
Conference or Workshop Item -
15
Parallelization Of CCSDS Hyperspectral Image Compression Using C++
Published 2018“…However, CCSDS-MHC has the potential to operate on multi-core system with the use of parallelization. …”
Get full text
Get full text
Monograph -
16
-
17
Authenticating sensitive diacritical texts using residual, data representation and pattern matching methods / Saqib Iqbal Hakak
Published 2018“…The objective is achieved using logical operations and the character segmentation. …”
Get full text
Get full text
Get full text
Thesis -
18
Sequential and parallel multiple tabu search algorithm for multiobjective urban transit scheduling problems
Published 2018“…Additionally, the MTS algorithm is also implemented in parallel computing to produce parallel MTS for generating comparable solutions in shorter computational times. …”
Get full text
Get full text
Thesis -
19
Parallel block backward differentiation formulas for solving ordinary differential equations.
Published 2008“…Numerical results are given to compare the speedup and efficiency of parallel algorithm and that of sequential algorithm.…”
Get full text
Article -
20
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…In this paper, we propose a parallel implementation technique using Chinese Remainder Theorem and thread on encryption and decryption operation in RSA when files are to be encrypted and decrypted. …”
Get full text
Get full text
Get full text
Article
