Search Results - (( using function mining algorithm ) OR ( parallel implementation level algorithm ))
Search alternatives:
- implementation level »
- mining algorithm »
- function mining »
- level algorithm »
- using function »
-
1
Parallel Implementation of Two Level Barotropic Models Applied to the Weather Prediction Problem
Published 2004“…To process the data collected from British Atmospheric Data Centre (BADC), the sequential programs in row and columnwise fashions are developed and implemented. Then the parallel algorithms are constructed and run using the Beowulf Cluster machine. …”
Get full text
Get full text
Thesis -
2
Implementation of High Speed Large Integer Multiplication Algorithm on Contemporary Architecture
Published 2018“…We are able to eliminate the bottleneck, the CRT algorithm from our previous implementation by replacing it with another level of CTFNT and hence increased the multiplication operand size to 4096, 192K, 384K and 768K-bit.In our FPGA implementation, we focused on designing the processing unit ourselves that is capable of computing 3072-bit multiplication. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. Experimental results indicate that as the thread level increases, the encryption and decryption time, which is the most time consuming operation, decreases which shows an improved speed of the RSA cryptosystem.The proposed implementation has a great potential to effectively deal with the RSA algorithm slow speed.…”
Get full text
Get full text
Get full text
Article -
4
The AGEB algorithm for solving the heat equation in three space dimensions and its parallelization using PVM
Published 2023“…It is inherently explicit and is therefore well suited for parallel implementation on the PVM where data decomposition is run asynchronously and concurrently at every time level. …”
Conference Paper -
5
The AGEB Algorithm for Solving the Heat Equation in Three Space Dimensions and Its Parallelization Using PVM
Published 2001“…It is inherently explicit and is therefore well suited for parallel implementation on the PVM where data decomposition is run asynchronously and concurrently at every time level. …”
Get full text
Get full text
Article -
6
Parallel and Separable Recursive Levenberg- Marquardt Training Algorithm
Published 2002“…By neglecting interneuron weight correlations the recently proposed RLM training algorithm can be decomposed at neuron level enabling weights to be updated in an efficient parallel manner. …”
Get full text
Get full text
Book Section -
7
The AGEB Algorithm for Solving the Heat Equation in Three Dimensions and Its Parallelization Using PVM
Published 2001“…It is inherently explicit and is therefore well suited for parallel implementation on the PVM where data decomposition is run asynchronously and concurrently at every time level. …”
Get full text
Get full text
Get full text
Article -
8
Tree-based contrast subspace mining method
Published 2020“…Those subspaces are termed as contrast subspaces. All existing mining contrast subspace methods (i.e. CSMiner and CSMiner-BPR) use density-based likelihood contrast scoring function to estimate the likelihood of a query object to target class against other class in a subspace. …”
Get full text
Get full text
Get full text
Thesis -
9
Evaluation of data mining models for predicting concrete strength
Published 2024“…The best performing model is selected and used to generate different sets objective-function that will be selected and used in a Particle Swarm Optimization algorithm to solve a single objective optimization problem that finds the optimal values of each concrete feature to maximize the strength of concrete. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
An embedded database design and implementation of a parallel IEEE XTS storage encryption for mobile devices
Published 2017“…To ensure higher security level, the developed system is implemented using the NIST-certified XTS-AES block encryption algorithm. …”
Get full text
Get full text
Get full text
Thesis -
11
Dissimilarity algorithm on conceptual graphs to mine text outliers
Published 2009“…In Comparison to other text outlier detection method, this approach managed to capture the semantics of documents through the use of CGs and is convenient to detect outliers through a simple dissimilarity function.Furthermore, our proposed algorithm retains a linear complexity with the increasing number of CGs.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Implementation of Parallel K-Means Algorithm to Estimate Adhesion Failure in Warm Mix Asphalt
Published 2020“…The results showed that the PKIP algorithm decreases the execution time up to 30 to 46 if compared with the sequential k means algorithm when implemented using multiprocessing and distributed computing. …”
Get full text
Get full text
Article -
13
A Rough-Apriori Technique in Mining Linguistic Association Rules
Published 2008“…It uses the rough membership function to capture the linguistic interval before implementing the Apriori algorithm to mine interesting association rules. …”
Get full text
Get full text
Get full text
Book Chapter -
14
Voting algorithms for large scale fault-tolerant systems
Published 2011“…To solve this problem and gain benefits of this algorithm, we employed parallel algorithm technique and by using optimal number of processors, we could propose optimal algorithms known as Parallel Average Voting and Parallel Weighted Average Voting which both have optimal time complexity and less calculation cost. …”
Get full text
Get full text
Thesis -
15
Multi-objective Binary Clonal Selection Algorithm In The Retrieval Phase Of Discrete Hopfield Neural Network With Weighted Systematic Satisfiability
Published 2024“…Based on the findings, the proposed logic mining model outperformed other baseline logic mining models for all the performance metrics used in the repository dataset. …”
Get full text
Get full text
Thesis -
16
Design and analysis of high performance and low power matrix filling for DNA sequence allignment accelerator using ASIC design flow / Nurul Farhana Abd Razak
Published 2010“…The objective of this paper is to improve the performance of the DNA sequence alignment and to optimize power reduction of the existing technique by using Smith Waterman (SW) algorithm. The scope of study is by using the matrix filling method which is in parallel implementation of the SmithWaterman algorithm. …”
Get full text
Get full text
Student Project -
17
Parallel strategies on a distributed parallel computer system
Published 2004“…The development of a few strategies parallel is being as a mechanism for IADE to make it implemented in parallel. …”
Get full text
Get full text
Monograph -
18
Development and applications of metaheuristic algorithms in engineering design and structural optimization / Ali Sadollah
Published 2013“…Metaheuristic algorithms have been extensively used in numerous domains especially in engineering. …”
Get full text
Get full text
Thesis -
19
Parallelizing GF (p) montgomery elliptic curve crypto-system operations to improve security and performance.
Published 2012“…The best performance level was achieved when parallelizing Montgomery ECC computations to eight parallel multipliers (PM) using homogeneous coordinates. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Parallelizing GF (p) montgomery elliptic curve crypto-system operations to improve security and performance.
Published 2013“…The best performance level was achieved when parallelizing Montgomery ECC computations to eight parallel multipliers (PM) using homogeneous coordinates. …”
Get full text
Get full text
Book Section
