Search Results - (( parallel distribution modified algorithm ) OR ( data distribution tree algorithm ))

Refine Results
  1. 1

    Parallel algorithms for numerical simulations of EHD ion-drag micropump on distributed parallel computing systems by Shakeel Ahmed, Kamboh

    Published 2014
    “…To implement the parallel algorithms a distributed parallel computing laboratory using easily available low cost computers is setup. …”
    Get full text
    Get full text
    Thesis
  2. 2

    A modified artificial neural network (ANN) algorithm to control shunt active power filter (SAPF) for current harmonics reduction by Sabo, Aliyu, Abdul Wahab, Noor Izzri, Mohd Radzi, Mohd Amran, Mailah, Nashiren Farzilah

    Published 2013
    “…The novelty control design is an artificial neural network (ANN) adopting a modified mathematical algorithm (a modified delta rule weight-updating W-H) and a suitable alpha value (learning rate value) which determines the filters optimal operation. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Parallel Diagonally Implicit Runge-Kutta Methods For Solving Ordinary Differential Equations by Din, Ummul Khair Salma

    Published 2009
    “…All algorithms are written in C language and the parallel code is implemented on Sun Fire V1280 distributed memory system. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6

    E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm by Bouke, Mohamed Aly, Abdullah, Azizol, ALshatebi, Sameer Hamoud, Abdullah, Mohd Taufik

    Published 2022
    “…The model design is Decision Tree (DT) algorithm-based, with an approach to data balancing since the data set used is highly unbalanced and one more approach for feature selection. …”
    Get full text
    Get full text
    Article
  7. 7

    Nano-scale VLSI clock routing module based on useful-skew tree algorithm by Eik Wee, Chew, Heng Sun, Ch'ng, Shaikh-Husin, Nasir, Hani, Mohamed Khalil

    Published 2006
    “…We implemented Useful-Skew Tree (UST) algorithm which is based on the deferred-merge embedding (DME) paradigm, as the clock layout synthesis engine. …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9
  10. 10

    Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari by Satari, Siti Zanariah

    Published 2015
    “…We first look at the concentration parameter of von Mises distribution. The von Mises distribution is the most commonly used probability distribution of a circular random variable, and the concentration of a circular data set is measured using the mean resultant length. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Improved tree routing protocol in zigbee networks by Al-Harbawi, Mostafa Kamil Abdulhusain

    Published 2010
    “…ImpTR protocol uses an approach to select next hope depending on new algorithm and uses the same tree topology construction for distributing address to all sensor nodes in the network. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Managing Heterogeneous Database Replication Using Persistence Layer Synchronous Replication (PLSR) by Noraziah, Ahmad, Abdalla, Ahmed N., Beg, Abul Hashem

    Published 2013
    “…It achieves faster time execution and cost minimization than that other replication processes. This algorithm also introduces a multi thread based persistence layer, which supports early binding and parallel connection to the servers. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Delineating mangrove forest zone using spectral reflectance by Abdul Whab @ Abdul Wahab,, Zulfa

    Published 2020
    “…By using geospatial techniques and remotely sensed imagery data, the distribution of mangrove tree species associating with anthropogenic matrix can clearly be identified and mapped. …”
    Get full text
    Get full text
    Thesis
  15. 15

    White root disease auto-detection system for rubber trees based on dynamic electro-biochemical latex properties / Mohd Suhaimi Sulaiman by Sulaiman, Mohd Suhaimi

    Published 2019
    “…All of the measurement inputs from the experiment were tested for the data distribution and discrimination between the conditions of the latex using statistical analysis. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Automatic generic process migration system in linux by Zarrabi, Amirreza

    Published 2012
    “…A migration algorithm is designed which attempts to exploit the unique features of the basic migration algorithms to form a generic algorithm. …”
    Get full text
    Get full text
    Thesis
  17. 17

    A 'snowflake' geometrical representation for optimised degree six 3-modified chordal ring networks by Chien, Stephen Lim Een, Raja Maamor Shah, Raja Noor Farah Azura, Othman, Mohamed

    Published 2016
    “…The performance parameters and properties of chordal rings have been researched extensively as models for parallel and distributed interconnection topology models since their founding in 1981. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Comparative performance of deep learning and machine learning algorithms on imbalanced handwritten data by Amri, A’inur A’fifah, Ismail, Amelia Ritahani, Zarir, Abdullah Ahmad

    Published 2018
    “…The experiment shows that although the algorithm is stable and suitable for multiple domains, the imbalanced data distribution still manages to affect the outcome of the conventional machine learning algorithms.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A

    Published 2022
    “…Subsequently, DDoS attack detection is performed based on random forest (RF) and decision tree (DT) algorithms. The model is implemented and tested on the CICDDoS2019 dataset using different data dimensionality reduction test scenarios. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A.

    Published 2022
    “…Subsequently, DDoS attack detection is performed based on random forest (RF) and decision tree (DT) algorithms. The model is implemented and tested on the CICDDoS2019 dataset using different data dimensionality reduction test scenarios. …”
    Get full text
    Get full text
    Get full text
    Article