Search Results - (( pattern perception modelling algorithm ) OR ( parallel optimization path algorithm ))

  • Showing 1 - 19 results of 19
Refine Results
  1. 1

    Tool path generation of contour parallel based on ant colony optimisation by Abdullah, Haslina, Ramli, Rizauddin, Abd Wahab, Dzuraidah, Abu Qudeiri, Jaber

    Published 2016
    “…An Ant Colony Optimisation (ACO) method is used to optimize the tool path length because of its capability to find the shortest tool path length. …”
    Get full text
    Get full text
    Article
  2. 2
  3. 3
  4. 4

    Restoration planning strategy of transmission system based on optimal energizing time of sectionalizing islands / Dian Najihah Abu Talib by Dian Najihah , Abu Talib

    Published 2019
    “…There are two discrete optimization techniques used in this work, which are the Artificial Bee Colony algorithm and Evolutionary Programming. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    A novel large-bit-size architecture and microarchitecture for the implementation of Superscalar Pipeline VLIW microprocessors by Lee, Weng Fook

    Published 2008
    “…Different adder architectures are investigated for suitability on synthesis implementation of large data bus size adder for efficient usage within the ALU. An adder algorithm using repetitive constructs in a parallel algorithm that allows for efficient and optimal synthesis for large data bus size is proposed as a suitable implementation for the adder within the ALU. …”
    Get full text
    Thesis
  6. 6

    A 'snowflake' geometrical representation for optimised degree six 3-modified chordal ring networks by Chien, Stephen Lim Een, Raja Maamor Shah, Raja Noor Farah Azura, Othman, Mohamed

    Published 2016
    “…A tree visualisation was constructed based on its connectivity to enable the generation of formulae for optimal diameter and average optimal path lengths. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques by Mustafa, Ahmed Sudad

    Published 2017
    “…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Handgrip strength evaluation using neuro fuzzy approach by Seng, W.C., Chitsaz, M.

    Published 2010
    “…The purpose of this study is to collect handgrip strength of patients and distinguish them from the normal persons. Multilevel Perception neural network utilizes the back-propagation learning algorithm is suitable to discover relationships and patterns in the dataset. …”
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Online teleoperation of writing manipulator through graphics processing unit based accelerated stereo vision by Abu Raid, Fadi Imad Osman

    Published 2021
    “…These algorithms are then parallelized using Compute Unified Device Architecture CUDA C language to run on Graphics Processing Unit GPU for hardware acceleration. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Auto raise hand in Microsoft teams (API/Extension) by Teh, Boon Hin

    Published 2023
    “…Artificial Intelligence focuses on developing intelligences of machines, by developing algorithms, machines are able to learn from data and patterns, even perform tasks that require human intelligence, such as visual perception, speech recognition, and decision-making. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12
  13. 13
  14. 14

    Advancing literary analysis with Python: a comprehensive study of simile detection and classification in the translation of Al-Abrat by Al Zahrawi, Rasha Talal, Syed Abdullah, Syed Nurulakla, Sarirete, Akila, Abdullah, Muhammad Alif Redzuan

    Published 2025
    “…Key findings reveal distinct patterns in simile usage, particularly the prevalence of perceptible-perceptible and cognitive-cognitive categories, emphasizing the role of figurative language in fostering thematic and emotional engagement. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    DC-based PV-powered home energy system by Sabry, Ahmad H.

    Published 2017
    “…A controller based on an algorithm of one time maximum power point (MPP) is proposed to mitigate those losses. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Watermarking technique based on ISB (Intermediate Significant Bit) by Zeki, Akram M., Abdul Manaf, Azizah, Olanweraju, Rashidah Funke

    Published 2010
    “…It inserts a perceptually transparent pattern called watermark in an image called host or cover using an embedding algorithm. …”
    Get full text
    Get full text
    Proceeding Paper
  17. 17

    Optimization of abrasive machining of ductile cast iron using water based SiO2 nanocoolant : a radial basis function by Azma Salwani, Ab Aziz

    Published 2012
    “…Multi-Layer Perception (MLP) along with batch back propagation algorithm are used. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  18. 18

    Digital Surface Model (DSM) Construction and Flood Hazard Simulation for Development Plans in Naga City, Philippines by Abd Rahman, Muhammad Zulkarnain, Dinand, Alkema

    Published 2007
    “…In this paper, there are 4 interpolation methods used, namely Australian National University's Digital Elevation Model algorithm (ANUDEM), Kriging, Polynomial and Triangulated Irregular Network (TIN). …”
    Get full text
    Get full text
    Article
  19. 19

    Permutation entropy based full-reference image quality qssessment by Baqar, Mohtashim *, Lau, Sian Lun *, Mansoor Ebrahim

    Published 2019
    “…Motivated by the need of appropriate objective models, we propose a novel objective IQA algorithm, namely, Permutation Entropy Deviation Index (PEDI), based on the working principle of permutation entropy (PE). …”
    Get full text
    Get full text
    Conference or Workshop Item