Search Results - (( solution construction sensor algorithm ) OR ( parallel optimization path algorithm ))

Refine Results
  1. 1

    Tool path generation of contour parallel based on ant colony optimisation by Abdullah, Haslina, Ramli, Rizauddin, Abd Wahab, Dzuraidah, Abu Qudeiri, Jaber

    Published 2016
    “…An Ant Colony Optimisation (ACO) method is used to optimize the tool path length because of its capability to find the shortest tool path length. …”
    Get full text
    Get full text
    Article
  2. 2
  3. 3
  4. 4

    Restoration planning strategy of transmission system based on optimal energizing time of sectionalizing islands / Dian Najihah Abu Talib by Dian Najihah , Abu Talib

    Published 2019
    “…There are two discrete optimization techniques used in this work, which are the Artificial Bee Colony algorithm and Evolutionary Programming. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    A novel large-bit-size architecture and microarchitecture for the implementation of Superscalar Pipeline VLIW microprocessors by Lee, Weng Fook

    Published 2008
    “…Different adder architectures are investigated for suitability on synthesis implementation of large data bus size adder for efficient usage within the ALU. An adder algorithm using repetitive constructs in a parallel algorithm that allows for efficient and optimal synthesis for large data bus size is proposed as a suitable implementation for the adder within the ALU. …”
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    A 'snowflake' geometrical representation for optimised degree six 3-modified chordal ring networks by Chien, Stephen Lim Een, Raja Maamor Shah, Raja Noor Farah Azura, Othman, Mohamed

    Published 2016
    “…A tree visualisation was constructed based on its connectivity to enable the generation of formulae for optimal diameter and average optimal path lengths. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques by Mustafa, Ahmed Sudad

    Published 2017
    “…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    A Robust Graph Theoretic Solution of Routing in Intelligent Networks by Qureshi, M.A., Hassan, M.F., Ehsan, M.K., Khan, M.O., Ali, M.Y., Khan, S.

    Published 2022
    “…That is why a simple and efficient algorithm is the need of the time. A robust routing solution SPT with OV+E time complexity is proposed to supersede the existing landmark. …”
    Get full text
    Get full text
    Article
  12. 12

    Design and development of single-axis solar tracking system and water level control for application of line focus concentrator for solar desalination process by Muhammad Adam, Zahari

    Published 2017
    “…Besides that, to make the system more flexible, we add the sensor which is ultrasonic sensor for measure water level. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13

    Fault Detection and Identification in Quadrotor System (Quadrotor Robot) by Chan, Shi Jing, Pebrianti, Dwi

    Published 2016
    “…The aim of the research is to construct and design a Fault Detection and Isolation algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Friendship Degree and Tenth Man Strategy: A new method for differentiating between erroneous readings and true events in wireless sensor networks by Adday, Ghaihab Hassan, Subramaniam, Shamala K., Zukarnain, Zuriati Ahmad, Samian, Normalia

    Published 2023
    “…FD-TMS was comprehensively assessed in a simulation environment utilizing a performance analysis tool constructed on Java. The results were compared to the baseline algorithm, highlighting key parameters like false alarms and event detection accuracy. …”
    Get full text
    Get full text
    Article
  15. 15

    Fault Tolerance for Complex System by Chan, Shi Jing, Pebrianti, Dwi, M. F., Abas, Luhur, Bayuaji

    Published 2016
    “…The aim of this research is to construct and design a new Fault Tolerance algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Energy-efficient communications in wireless powered cognitive radio networks based on game theory / Fadhil Mukhlif Aswad Al-Obaidy by Fadhil Mukhlif , Aswad Al-Obaidy

    Published 2020
    “…In order to prove the effectiveness of such algorithms, numerical solutions are used in comparison with current power control algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Earthquake alarm detector / Nik Aqil Farihin Nik Mohd Azizee by Nik Mohd Azizee, Nik Aqil Farihin

    Published 2024
    “…The proposed Earthquake Alarm Detector would utilize advanced seismic sensors, real-time data processing algorithms, and communication technologies to deliver prompt and accurate warnings, therefore mitigating the impact of earthquakes. …”
    Get full text
    Get full text
    Student Project
  19. 19

    Online teleoperation of writing manipulator through graphics processing unit based accelerated stereo vision by Abu Raid, Fadi Imad Osman

    Published 2021
    “…These algorithms are then parallelized using Compute Unified Device Architecture CUDA C language to run on Graphics Processing Unit GPU for hardware acceleration. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Fault Tolerance For Two Wheel Mobile Robot Using FSM (Finite State Machine) by Chan, Shi Jing, Pebrianti, Dwi, M. F., Abas, Bayuaji, Luhur

    Published 2017
    “…The aim of this research is to construct and design a Fault Tolerance algorithm considered to speed up the fault isolation procedure and it might identify multiple fault with the same static fault signature. …”
    Get full text
    Get full text
    Get full text
    Article