Search Results - (( parallel optimization path algorithm ) OR ( globally distributed learning algorithm ))
Search alternatives:
- parallel optimization »
- distributed learning »
- learning algorithm »
- optimization path »
- path algorithm »
-
1
Tool path generation of contour parallel based on ant colony optimisation
Published 2016“…An Ant Colony Optimisation (ACO) method is used to optimize the tool path length because of its capability to find the shortest tool path length. …”
Get full text
Get full text
Article -
2
Minimizing machining airtime motion with an ant colony algorithm
Published 2016Get full text
Get full text
Article -
3
-
4
Restoration planning strategy of transmission system based on optimal energizing time of sectionalizing islands / Dian Najihah Abu Talib
Published 2019“…There are two discrete optimization techniques used in this work, which are the Artificial Bee Colony algorithm and Evolutionary Programming. …”
Get full text
Get full text
Get full text
Thesis -
5
Mapping the distribution of oil palm using Landsat 8 data by comparing machine learning and non-machine learning algorithms
Published 2019“…Hence, the mapping of oil palm distributions via machine learning algorithm was better than that via non-machine learning algorithm.…”
Get full text
Get full text
Get full text
Article -
6
Binary ant colony optimization algorithm in learning random satisfiability logic for discrete hopfield neural network
Published 2024“…This study introduced a novel ant colony optimization algorithm that implements the population selection strategy of the Estimation of Distribution Algorithm and a new pheromone updating formula. …”
Get full text
Get full text
Get full text
Article -
7
Chaos search in fourire amplitude sensitivity test
Published 2012“…Work in Artificial Intelligence (AI) often involves search algorithms. In many complicated problems, however, local search algorithms may fail to converge into global optimization and global search procedures are needed. …”
Get full text
Get full text
Get full text
Article -
8
Chaos Search in Fourier Amplitude Sensitivity Test
Published 2012“…Work in Artificial Intelligence (AI) often involves search algorithms. In many complicated problems, however, local search algorithms may fail to converge into global optimization and global search procedures are needed. …”
Get full text
Get full text
Get full text
Article -
9
A novel large-bit-size architecture and microarchitecture for the implementation of Superscalar Pipeline VLIW microprocessors
Published 2008“…Different adder architectures are investigated for suitability on synthesis implementation of large data bus size adder for efficient usage within the ALU. An adder algorithm using repetitive constructs in a parallel algorithm that allows for efficient and optimal synthesis for large data bus size is proposed as a suitable implementation for the adder within the ALU. …”
Get full text
Thesis -
10
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…Distributed denial of service (DDoS) attacks are one of the most common global challenges faced by service providers on the web. …”
Get full text
Get full text
Get full text
Article -
11
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…Distributed denial of service (DDoS) attacks are one of the most common global challenges faced by service providers on the web. …”
Get full text
Get full text
Get full text
Article -
12
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…Distributed denial of service (DDoS) attacks are one of the most common global challenges faced by service providers on the web. …”
Get full text
Get full text
Get full text
Article -
13
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…Distributed denial of service (DDoS) attacks are one of the most common global challenges faced by service providers on the web. …”
Get full text
Get full text
Get full text
Article -
14
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2023“…Distributed denial of service (DDoS) attacks are one of the most common global challenges faced by service providers on the web. …”
Get full text
Get full text
Get full text
Article -
15
Plant identification using combination of fuzzy c-means spatial pyramid matching, gist, multi-texton histogram and multiview dictionary learning
Published 2016“…Moreover, instead of concatenating feature vectors together and send to classifier, sparse coding and dictionary learning methods are used and instead of considering all features as one view (visual feature), K-SVD algorithm that is one of the famous algorithms for sparse representation is optimized and developed to multi-view model.The experimental results prove that the proposed methods has improved accuracy by 53.77% compared to concatenating features and classic K-SVD dictionary learning model as well.…”
Get full text
Get full text
Thesis -
16
A 'snowflake' geometrical representation for optimised degree six 3-modified chordal ring networks
Published 2016“…A tree visualisation was constructed based on its connectivity to enable the generation of formulae for optimal diameter and average optimal path lengths. …”
Get full text
Get full text
Conference or Workshop Item -
17
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
Get full text
Get full text
Get full text
Thesis -
18
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…In machine learning algorithm, choosing the most relevant features for each attack is a very important requirement, especially in mobile ad hoc networks where the network topology dynamically changes. …”
Get full text
Get full text
Get full text
Thesis -
19
An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection
Published 2018“…The DE is integrated with CS at the population initialization by distributing the population linearly. This linear distribution gives the population a unique, stable, and progressive distribution process. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Parameter estimation in computational systems biology models: a comparative study of initialization methods in global optimization
Published 2022“…Statistical results revealed that uniformly distributed random number generator (RNG) and controlled randomization (CR) that being used in ESS may lead to poor algorithm performance. …”
Get full text
Get full text
Get full text
Article
