Search Results - (( using based data algorithm ) OR ( parallel implementation using algorithm ))

Refine Results
  1. 1

    Parallelization of noise reduction algorithm for seismic data on a beowulf cluster by Aziz, I. A., Sandran, T., Haron, N. S., Hasan, M. H, Mehat, M.

    Published 2010
    “…This paper presents the parallelization of a sequential noise reduction algorithm for seismic data processing into a parallel algorithm. …”
    Get full text
    Get full text
    Citation Index Journal
  2. 2

    Parallel algorithms for numerical simulations of EHD ion-drag micropump on distributed parallel computing systems by Shakeel Ahmed, Kamboh

    Published 2014
    “…To implement the parallel algorithms a distributed parallel computing laboratory using easily available low cost computers is setup. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Parallel Kalman filter-based multi-human tracking in surveillance video by Yussiff, A.-L., Yong, S.-P., Baharudin, B.B.

    Published 2014
    “…The parallel implementation has increased the frame processing speed by 20-30 percent over the CPU implementation. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Fast Finite Difference Time Domain Algorithms for Solving Antenna Application Problem by Hasan, Mohammad Khatim

    Published 2008
    “…In parallel implementation, techniques such as static scheduling, data decomposition and load balancing is used. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Sequential and parallel multiple tabu search algorithm for multiobjective urban transit scheduling problems by Uvaraja, Vikneswary

    Published 2018
    “…Additionally, the MTS algorithm is also implemented in parallel computing to produce parallel MTS for generating comparable solutions in shorter computational times. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Improving parallel self-organizing map using heterogeneous uniform memory access / Muhammad Firdaus Mustapha by Mustapha, Muhammad Firdaus

    Published 2018
    “…Self-organizing Map (SOM) is a very popular algorithm that has been used as clustering algorithm and data exploration. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Parallel Implementation of Two Level Barotropic Models Applied to the Weather Prediction Problem by Bahri, Susila

    Published 2004
    “…Then the parallel algorithms are constructed and run using the Beowulf Cluster machine. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Design and implementation of a real-time adaptive learning algorithm controller for a 3-DOF parallel manipulator / Mustafa Jabbar Hayawi by Hayawi, Mustafa Jabbar

    Published 2015
    “…System identification is a prerequisite to analysis of a dynamic system. It is performed using neural network Auto Regressive with exogenous (NNARX) model based on the input/ output experimental data. …”
    Get full text
    Get full text
    Thesis
  10. 10

    The Parallel Fuzzy C-Median Clustering Algorithm Using Spark for the Big Data by Mallik, Moksud Alam, Zulkurnain, Nurul Fariza, Siddiqui, Sumrana, Sarkar, Rashel

    Published 2024
    “…Therefore, we develop a Parallel Fuzzy C-Median Clustering Algorithm Using Spark for Big Data that can handle large datasets while maintaining high accuracy and scalability. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Parallel power load abnormalities detection using fast density peak clustering with a hybrid canopy-K-means algorithm by Al-Jumaili A.H.A., Muniyandi R.C., Hasan M.K., Singh M.J., Paw J.K.S., Al-Jumaily A.

    Published 2025
    “…Data vectors are generated based on the time needed, sequential and parallel candidate feature data are obtained, and the data rate is combined. …”
    Article
  12. 12
  13. 13

    An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe by Yakub Kayode, Saheed, Kazeem Alagbe, Gbolagade

    Published 2017
    “…In this paper, we propose a parallel implementation technique using Chinese Remainder Theorem and thread on encryption and decryption operation in RSA when files are to be encrypted and decrypted. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Enhancing speed performance of the cryptographic algorithm based on the lucas sequence by M. Abulkhirat, Esam

    Published 2003
    “…Reducing the calculation time of the algorithm, in sequential and parallel platforms, using the doubling-rule technique combined with a new scheme led to a strong improvement of the LUC algorithm speed. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Voting algorithms for large scale fault-tolerant systems by Karimi, Abbas

    Published 2011
    “…To solve this problem and gain benefits of this algorithm, we employed parallel algorithm technique and by using optimal number of processors, we could propose optimal algorithms known as Parallel Average Voting and Parallel Weighted Average Voting which both have optimal time complexity and less calculation cost. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Accelerating DNA sequence alignment based on smith waterman algorithm using recursive variable expansion / Muhamad Faiz Ismail by Ismail, Muhamad Faiz

    Published 2014
    “…Finally, we validate the proposed DP framework using the Smith-Waterman (SW) algorithm, which is a widely used, computation and data intensive application in bioinformatics. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19

    FPGA implementation of CPFSK modulation techniques for HF data communication by Jaswar, Fitri Dewi, Sha'ameri, Ahmad Zuri

    Published 2003
    “…Digital modulation based on FSK is widely used in HF data communication. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    An embedded database design and implementation of a parallel IEEE XTS storage encryption for mobile devices by Alomari, Mohammad Ahmed Mohammad

    Published 2017
    “…To ensure higher security level, the developed system is implemented using the NIST-certified XTS-AES block encryption algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis