Search Results - (( normal distribution some algorithm ) OR ( parallel optimization path algorithm ))

Refine Results
  1. 1

    Tool path generation of contour parallel based on ant colony optimisation by Abdullah, Haslina, Ramli, Rizauddin, Abd Wahab, Dzuraidah, Abu Qudeiri, Jaber

    Published 2016
    “…An Ant Colony Optimisation (ACO) method is used to optimize the tool path length because of its capability to find the shortest tool path length. …”
    Get full text
    Get full text
    Article
  2. 2
  3. 3
  4. 4

    Restoration planning strategy of transmission system based on optimal energizing time of sectionalizing islands / Dian Najihah Abu Talib by Dian Najihah , Abu Talib

    Published 2019
    “…There are two discrete optimization techniques used in this work, which are the Artificial Bee Colony algorithm and Evolutionary Programming. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    A novel large-bit-size architecture and microarchitecture for the implementation of Superscalar Pipeline VLIW microprocessors by Lee, Weng Fook

    Published 2008
    “…Different adder architectures are investigated for suitability on synthesis implementation of large data bus size adder for efficient usage within the ALU. An adder algorithm using repetitive constructs in a parallel algorithm that allows for efficient and optimal synthesis for large data bus size is proposed as a suitable implementation for the adder within the ALU. …”
    Get full text
    Thesis
  6. 6

    JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation by Abu, Ahmad Zaidee

    Published 2008
    “…This thesis work studied on digital image encryption algorithms performed towards JPEG images. With image encryption algorithms, JPEG images can be securely scrambled or encrypted prior to distribution. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Dynamic robust bootstrap method based on LTS estimators by Midi, Habshah, Uraibi, Hassan Sami, Al-Talib, Bashar Abdul Aziz Majeed

    Published 2009
    “…The applications of bootstrap methods in regression analysis have drawn much attention to the statistics practitioners because of some practical reasons. In order to make reliable inferences about the parameters of a model, require that the parameter estimates are normally distributed. …”
    Get full text
    Get full text
    Article
  8. 8

    Optimal network reconfiguration and intelligent service restoration prediction technique based on Cuckoo search spring algorithm / Mohamad Izwan Zainal by Zainal, Mohamad Izwan

    Published 2022
    “…Modern distribution network is a complex network due to load demand varies and normally designed in radial circuit in which the circuit has ready to close switch at the end of the circuit when the situation needed. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Automated Face Detection Using Skin Color Segmentation and Viola-Jones Algorithm by Ahmad Fakhri, Ab. Nasir, Ahmad Shahrizan, Abdul Ghani, Muhammad Aizzat, Zakaria, Anwar, P. P. Abdul Majeed, Ahmad Najmuddin, Ibrahim

    Published 2019
    “…Despite of this, this research also found that both YCbCr and HSV color model are having some limitation when dealing with darker face and lightning condition since the skin color become slightly out of range from normal skin color distribution.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    A 'snowflake' geometrical representation for optimised degree six 3-modified chordal ring networks by Chien, Stephen Lim Een, Raja Maamor Shah, Raja Noor Farah Azura, Othman, Mohamed

    Published 2016
    “…A tree visualisation was constructed based on its connectivity to enable the generation of formulae for optimal diameter and average optimal path lengths. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques by Mustafa, Ahmed Sudad

    Published 2017
    “…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Investigation of evolutionary multi-objective algorithms in solving view selection problem / Seyed Hamid Talebian by Talebian, Seyed Hamid

    Published 2013
    “…In addition to the normal metrics, the computational time for executing each algorithm was also measured and compared. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    A new variant of black hole algorithm based on multi population and levy flight for clustering problem by Haneen Abdul Wahab, Abdul Raheem

    Published 2020
    “…The obtained results were compared with the BH and previous optimization algorithms for both test functions as well as data clustering in terms of normal and high dimensional datasets. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Constrained Self-Adaptive Harmony Search Algorithm With 2-Opt Swapping For Driver Scheduling Problem Of University Shuttle Bus by Shaffiei, Zatul Alwani, Abal Abas, Zuraida, Md Yunos, Norhazwani, Amir Hamzah, Amir Syafiq Syamin Syah, Zainal Abidin, Zaheera, Chong, Kuan Eng

    Published 2019
    “…In each iteration, the BW values were often changed and randomly chosen within the set, whereas the 2-opt swapping normally used in travelling salesman problem was applied for route constraint based on some rules. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Adaptive Traffic Prioritization Algorithm Over Ad Hoc Network Using IEEE 802.11e by Anuar, Ammar

    Published 2016
    “…Although IEEE 802.11e has been widely implemented in commercial hardware, the EDCA parameters are normally preset with some default values recommended by the standard. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Just Queuing: Policy-Based Scheduling Mechanism for Packet Switching Networks by Miaji, Yaser Shamsulhak A

    Published 2011
    “…This research adopts the restricted charge policy which imposes the protection of normal user. In terms of the complexity property, genetic algorithm has an advantage in holding the fitness score of the queue in separate storage space which potentially minimises the complexity of the algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Permission-based fault tolerant mutual exclusion algorithm for mobile Ad Hoc networks by Zarafshan, Faraneh

    Published 2015
    “…Due to these limitations, conventional mutual exclusion algorithms presented for distributed systems (DS) are not applicable for MANETs unless they attach to a mechanism for dynamic changes in their topology. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Online teleoperation of writing manipulator through graphics processing unit based accelerated stereo vision by Abu Raid, Fadi Imad Osman

    Published 2021
    “…These algorithms are then parallelized using Compute Unified Device Architecture CUDA C language to run on Graphics Processing Unit GPU for hardware acceleration. …”
    Get full text
    Get full text
    Thesis