Search Results - (( parallel optimization path algorithm ) OR ( variable extraction schemes algorithm ))
Search alternatives:
- parallel optimization »
- variable extraction »
- optimization path »
- schemes algorithm »
- path algorithm »
-
1
Tool path generation of contour parallel based on ant colony optimisation
Published 2016“…An Ant Colony Optimisation (ACO) method is used to optimize the tool path length because of its capability to find the shortest tool path length. …”
Get full text
Get full text
Article -
2
Minimizing machining airtime motion with an ant colony algorithm
Published 2016Get full text
Get full text
Article -
3
-
4
Restoration planning strategy of transmission system based on optimal energizing time of sectionalizing islands / Dian Najihah Abu Talib
Published 2019“…There are two discrete optimization techniques used in this work, which are the Artificial Bee Colony algorithm and Evolutionary Programming. …”
Get full text
Get full text
Get full text
Thesis -
5
Towards Enhancing the Performance of Grid-Tied VSWT via Adopting Sine Cosine Algorithm-Based Optimal Control Scheme
Published 2021“…This paper is aimed at introducing a novel application of the sine cosine algorithm (SCA) which attempts to find the optimal gains of proportional-integral (PI) controllers used to control the power electronic converters (PEC) equipped with the variable speed wind turbine (VSWT) such that a maximum power extraction and performance enhancement can be realized. …”
Get full text
Get full text
Article -
6
A novel large-bit-size architecture and microarchitecture for the implementation of Superscalar Pipeline VLIW microprocessors
Published 2008“…Different adder architectures are investigated for suitability on synthesis implementation of large data bus size adder for efficient usage within the ALU. An adder algorithm using repetitive constructs in a parallel algorithm that allows for efficient and optimal synthesis for large data bus size is proposed as a suitable implementation for the adder within the ALU. …”
Get full text
Thesis -
7
-
8
Perturbation stochastic model updating of a bolted structure / Mohamad Azam Shah Aziz Shah
Published 2022“…The scheme was developed by introducing a multidimensional analysis consisting of a systematic quasi-random sampling algorithm. …”
Get full text
Get full text
Thesis -
9
A 'snowflake' geometrical representation for optimised degree six 3-modified chordal ring networks
Published 2016“…A tree visualisation was constructed based on its connectivity to enable the generation of formulae for optimal diameter and average optimal path lengths. …”
Get full text
Get full text
Conference or Workshop Item -
10
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
Get full text
Get full text
Get full text
Thesis -
11
CAT CHAOTIC GENETIC ALGORITHM BASED TECHNIQUE AND HARDWARE PROTOTYPE FOR SHORT TERM ELECTRICAL LOAD FORECASTING
Published 2017“…In the hybrid scheme, the initial parameters of the modified BP neural network are optimized by using the global search ability of genetic algorithm, improved by cat chaotic mapping to enrich its optimization capability. …”
Get full text
Get full text
Thesis -
12
-
13
Fuzzy logic-based hill climbing technique for photovoltaic maximum power point tracking converter
Published 2013“…Simulation results are presented to validate performance of the algorithm under different irradiation schemes, and to compare with the results obtained from conventional algorithm. …”
Get full text
Get full text
Thesis -
14
Online teleoperation of writing manipulator through graphics processing unit based accelerated stereo vision
Published 2021“…These algorithms are then parallelized using Compute Unified Device Architecture CUDA C language to run on Graphics Processing Unit GPU for hardware acceleration. …”
Get full text
Get full text
Thesis -
15
DC-based PV-powered home energy system
Published 2017“…A controller based on an algorithm of one time maximum power point (MPP) is proposed to mitigate those losses. …”
Get full text
Get full text
Thesis -
16
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015“…An Integrated Anomaly Detection Scheme ( IADS) is proposed to overcome the aforesaid drawbacks. …”
Get full text
Get full text
Thesis -
17
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…Many programming languages are used for programming; Java programming language is known to be most common due to its features, the use of this popular language increases an attacker's ability to steal intellectual property (IP), as the source program is translated to an intermediate format retaining most of the information such as meaningful variables names present in source code. An attacker can easily reconstruct source code from such intermediate formats to extract sensitive information such as proprietary algorithms present in the software. …”
Get full text
Get full text
Thesis
