Search Results - (( parallel estimation window algorithm ) OR ( parallel distribution search algorithm ))
Search alternatives:
- parallel distribution »
- parallel estimation »
- window algorithm »
- search »
-
1
Embedded parallel distributed artificial intelligent processors for adaptive beam forming in WCDMA system
Published 2023Subjects:Conference paper -
2
Topology-aware hypergraph based approach to optimize scheduling of parallel applications onto distributed parallel architectures
Published 2020“…The first step lies at the modelling of parallel applications running on heterogeneous parallel computers. …”
Get full text
Get full text
Thesis -
3
Solving multi-objective dynamic vehicle routing problem with time windows using multi-objective algorithm
Published 2022“…Our algorithm uses non-fitness evolutionary distributed parallelized adaptive large neighbourhood search (NEDPALNS). …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
Resource Minimization in a Real-time Depth-map Processing System on FPGA
Published 2011“…Depth-map algorithm allows camera system to estimate depth. It is a computational intensive algorithm, but can be implemented with high speed on hardware due to the parallelism property. …”
Get full text
Get full text
Conference or Workshop Item -
5
Fruit-Fly Based Searching Algorithm For Cooperative Swarming Robotic System
Published 2013“…The fruit flies or Drosophila Melanogaster movement strategy offers some advantages such as strategic 'search-aggregation' cycle, distribution of moving patterns with Levy Random, information sharing in real-time, and reduction of controller parameters during movements. …”
Get full text
Get full text
Thesis -
6
New CFAR algorithm and circuit development for radar receiver
Published 2020“…To detect targets in such environments, it needs a robust CFAR algorithm that excises the target spikes and clutter edges from the CFAR window to give the best possible estimation of the noise background. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
CSC742 - Storage and Retrieval Algorithms / College of Computing, Informatics and Media
Published 2022Get full text
Get full text
Get full text
Teaching Resource -
8
CSC742: Storage and Retrieval Algorithms / College of Computing, Informatics and Mathematics
Published 2018Get full text
Get full text
Get full text
Teaching Resource -
9
MINIMIZATION OF RESOURCE UTILIZATION FOR A REAL-TIME DEPTH-MAP COMPUTATIONAL MODULE ON FPGA
Published 2011“…Depth-map algorithm allows camera system to estimate depth in many applications. …”
Get full text
Get full text
Thesis -
10
-
11
P2P-Based Image Recognition for Component Tracking in a Large Engineering Domain
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…The reason for using variable length searching is its effectiveness in searching for high dimensional space and reducing the number of candidates' features. …”
Get full text
Get full text
Thesis -
13
Estimation of core size distribution of magnetic nanoparticles using high-Tc SQUID magnetometer and particle swarm optimizer-based inversion technique
Published 2023“…The PSO inverse technique is then applied to the magnetization curve to construct the magnetic moment distribution. A multimodal normalized log-normal distribution was used in the minimization of the objective function of the PSO inversion technique, and a modification of the PSO search region is proposed to improve the exploration and exploitation of the PSO particles. …”
Get full text
Get full text
Get full text
Article -
14
Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure
Published 2015“…Moreover, for the purpose of empirical evidences, some parameters are chosen in the course of the process to validate the efficiency in terms of algorithmic running time and memory consumptions. We then conduct a comparative analysis toward estimating the running time during the encryption and decryption process. …”
Get full text
Get full text
Thesis
