Search Results - (( parallel optimization path algorithm ) OR ( globally distributed learning algorithm ))

Refine Results
  1. 1

    Tool path generation of contour parallel based on ant colony optimisation by Abdullah, Haslina, Ramli, Rizauddin, Abd Wahab, Dzuraidah, Abu Qudeiri, Jaber

    Published 2016
    “…An Ant Colony Optimisation (ACO) method is used to optimize the tool path length because of its capability to find the shortest tool path length. …”
    Get full text
    Get full text
    Article
  2. 2
  3. 3
  4. 4

    Restoration planning strategy of transmission system based on optimal energizing time of sectionalizing islands / Dian Najihah Abu Talib by Dian Najihah , Abu Talib

    Published 2019
    “…There are two discrete optimization techniques used in this work, which are the Artificial Bee Colony algorithm and Evolutionary Programming. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Binary ant colony optimization algorithm in learning random satisfiability logic for discrete hopfield neural network by Gao, Yuan, Mohd Kasihmuddin, Mohd Shareduwan, Chen, Ju, Zheng, Chengfeng, Romli, Nurul Atiqah, Mansor, Mohd. Asyraf, Zamri, Nur Ezlin

    Published 2024
    “…This study introduced a novel ant colony optimization algorithm that implements the population selection strategy of the Estimation of Distribution Algorithm and a new pheromone updating formula. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Chaos search in fourire amplitude sensitivity test by Koda, Masato

    Published 2012
    “…Work in Artificial Intelligence (AI) often involves search algorithms. In many complicated problems, however, local search algorithms may fail to converge into global optimization and global search procedures are needed. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Chaos Search in Fourier Amplitude Sensitivity Test by Koda, Masato

    Published 2012
    “…Work in Artificial Intelligence (AI) often involves search algorithms. In many complicated problems, however, local search algorithms may fail to converge into global optimization and global search procedures are needed. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    A novel large-bit-size architecture and microarchitecture for the implementation of Superscalar Pipeline VLIW microprocessors by Lee, Weng Fook

    Published 2008
    “…Different adder architectures are investigated for suitability on synthesis implementation of large data bus size adder for efficient usage within the ALU. An adder algorithm using repetitive constructs in a parallel algorithm that allows for efficient and optimal synthesis for large data bus size is proposed as a suitable implementation for the adder within the ALU. …”
    Get full text
    Thesis
  10. 10

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A

    Published 2022
    “…Distributed denial of service (DDoS) attacks are one of the most common global challenges faced by service providers on the web. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A.

    Published 2022
    “…Distributed denial of service (DDoS) attacks are one of the most common global challenges faced by service providers on the web. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Ahmed Dheyab, Saad, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A

    Published 2022
    “…Distributed denial of service (DDoS) attacks are one of the most common global challenges faced by service providers on the web. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama

    Published 2022
    “…Distributed denial of service (DDoS) attacks are one of the most common global challenges faced by service providers on the web. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama

    Published 2023
    “…Distributed denial of service (DDoS) attacks are one of the most common global challenges faced by service providers on the web. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Plant identification using combination of fuzzy c-means spatial pyramid matching, gist, multi-texton histogram and multiview dictionary learning by Safa, Soodabeh

    Published 2016
    “…Moreover, instead of concatenating feature vectors together and send to classifier, sparse coding and dictionary learning methods are used and instead of considering all features as one view (visual feature), K-SVD algorithm that is one of the famous algorithms for sparse representation is optimized and developed to multi-view model.The experimental results prove that the proposed methods has improved accuracy by 53.77% compared to concatenating features and classic K-SVD dictionary learning model as well.…”
    Get full text
    Get full text
    Thesis
  16. 16

    A 'snowflake' geometrical representation for optimised degree six 3-modified chordal ring networks by Chien, Stephen Lim Een, Raja Maamor Shah, Raja Noor Farah Azura, Othman, Mohamed

    Published 2016
    “…A tree visualisation was constructed based on its connectivity to enable the generation of formulae for optimal diameter and average optimal path lengths. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques by Mustafa, Ahmed Sudad

    Published 2017
    “…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques by Farhan, Farhan Abdel-Fattah Ahmad

    Published 2011
    “…In machine learning algorithm, choosing the most relevant features for each attack is a very important requirement, especially in mobile ad hoc networks where the network topology dynamically changes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection by Ayodele Nojeem, Lasisi

    Published 2018
    “…The DE is integrated with CS at the population initialization by distributing the population linearly. This linear distribution gives the population a unique, stable, and progressive distribution process. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Parameter estimation in computational systems biology models: a comparative study of initialization methods in global optimization by Muhammad Akmal, Remli, Nor Syahidatul Nadiah, Ismail, Noor Azida, Sahabudin, Nor Bakiah, Abd Warif

    Published 2022
    “…Statistical results revealed that uniformly distributed random number generator (RNG) and controlled randomization (CR) that being used in ESS may lead to poor algorithm performance. …”
    Get full text
    Get full text
    Get full text
    Article