Search Results - critical system algorithm

Search alternatives:

Refine Results
  1. 1

    BIOLOGICAL INSPIRED INTRUSION PREVENTION AND SELF-HEALING SYSTEM FOR CRITICAL SERVICES NETWORK by MOHAMED AHMED ELSHEIK, MUNA ELSADIG

    Published 2011
    “…With the explosive development of the critical services network systems and Internet, the need for networks security systems have become even critical with the enlargement of information technology in everyday life. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Power system intentional islanding for different contingency scenarios using discrete optimization technique by Nur Zawani Binti Saharuddin

    Published 2023
    “…The performance of the proposed MDEP algorithm was evaluated using the IEEE 30-bus, IEEE 39-bus, and IEEE 118-bus test systems. …”
    text::Thesis
  3. 3

    An Algorithmic Approach for Stability of an Autonomous System by Cik Soh, Shaharuddin

    Published 2002
    “…Search for critical point is conducted. L2. Eigenvalues of the linear system are computed. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Indoor global path planning based on critical cells using dijkstra algorithm by Azrul Amri, Jamal, Engku Fadzli Hasan, Syed Abdullah, Fatma Susilawati, Mohamad

    Published 2015
    “…Path planning has been implemented in various robotics systems, and the results checked. This paper proposes global path planning based on grids representation in an indoor environment using Dijkstra algorithm. …”
    Get full text
    Get full text
    Article
  5. 5

    Stochastic And Modified Sequent Peak Algorithm For Reservoir Planning Analysis Considering Performance Indices by Oskoui, Issa Saket

    Published 2016
    “…This study is on modeling the critical period and total storage capacity of reservoir systems employing performance criteria and synthetic data generation technique. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Thermodynamics and critical behaviors of long-range interacting magnetic system using tsallis non-extensive statistics by Bolandhemat, Najmeh, Rahman, Md. Mahmudur

    Published 2015
    “…Following that, we present a suitable algorithm in Monte Carlo method (Metropolis algorithm) to simulate spin systems with long-range interactions according to the Hamiltonian of Ising model in Tsallis statistics with suitable boundary conditions. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    An efficient algorithm for independent tasks scheduling in heterogeneous computing systems by Al-Qadhi, Abdulrahman Khaldoon Mahmood

    Published 2016
    “…Task scheduling is critical in heterogenous systems, especially with the huge number of tasks transmitted over grid. …”
    Get full text
    Get full text
    Thesis
  8. 8

    New synchronization protocol for distributed system with TCP extension by Bayat, Peyman

    Published 2013
    “…Another aspect of distributed systems, which considered in the thesis, is process allocation to resources (such as critical sections). …”
    Get full text
    Get full text
    Thesis
  9. 9

    Feature-based face recognition system using utilized artificial neural network by Chai, Tong Yuen

    Published 2010
    “…The proposed automatic feature-based face recognition system has efficiency more than 95% under the stated critical conditions. …”
    Get full text
    Thesis
  10. 10

    Genetic algorithm fuzzy logic for medical knowledge-based pattern classification by Tan, Chin Hooi, Tan, Mei Sze, Chang, Siow Wee, Yap, Keem Siah, Yap, Hwa Jen, Wong, Shen Yuong

    Published 2018
    “…This research proposed an algorithm named Genetic Algorithm Fuzzy Logic (GAFL) with Pittsburg approach for rules learning and induction in genetic fuzzy system knowledge discovery. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Thermodynamic properties of transverse field quantum Ising model using tensor network formalism / Pang Sin Yang by Pang , Sin Yang

    Published 2020
    “…Although theoretically, divergence at critical points only happen in an infinite system, one can obtain the critical exponents through simulation of finite-size 1D-tQIM. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Two Stages Transfer Algorithm (TSTT) for independent tasks scheduling in heterogeneous computing systems by Al-Qadhi, Abdulrahman K., Ariffin, Ahmad Alauddin, Latip, Rohaya, Abdul Hamid, Nor Asila Wati, Al-Zubaidi, Ammar S.

    Published 2018
    “…Task scheduling is critical in heterogeneous systems especially with the huge number of tasks transmitted over grid causing system delay. …”
    Get full text
    Get full text
    Article
  14. 14

    Genetic algorithm fuzzy logic for medical knowledge-based pattern classification by Tan C.H., Tan M.S., Chang S.-W., Yap K.S., Yap H.J., Wong S.Y.

    Published 2023
    “…This research proposed an algorithm named Genetic Algorithm Fuzzy Logic (GAFL) with Pittsburg approach for rules learning and induction in genetic fuzzy system knowledge discovery. …”
    Article
  15. 15

    Improving utility accrual scheduling algorithm for adaptive real-time system by Ahmad, Idawaty, Othman, Mohamed, Ahmad Zukarnain, Zuriati, Othman, Muhammad Fauzan

    Published 2008
    “…Both of these algorithms are developed for adaptive real-time system environment where untoward effects such as deadline misses and overloads are tolerable. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16
  17. 17

    A preemptive utility accrual scheduling algorithm in adaptive real time system. by Ahmad, Idawaty, Subramaniam, Shamala, Othman, Mohamed, Othman, Muhammad Fauzan

    Published 2008
    “…These scheduling algorithms are designed for adaptive real time system environment where undesirable effects such as overload and deadline misses are tolerable. …”
    Get full text
    Get full text
    Article
  18. 18

    Permission-based fault tolerant mutual exclusion algorithm for mobile Ad Hoc networks by Zarafshan, Faraneh

    Published 2015
    “…It does not utilize any token, that is similar to permission-based, and the latest node having the critical section influences the entrance of the next node to the critical section, that is similar to token-based algorithms. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Exact parallel plurality voting algorithm for totally ordered object space fault-tolerant systems by Karimi, Abbas, Zarafshan, Faraneh, Jantan, Adznan, Ramli, Abdul Rahman, Saripan, M. Iqbal, Syed Mohamed, Syed Abdul Rahman Al-Haddad

    Published 2012
    “…Since parallel algorithms normally have high processing speed and are especially appropriate for large scale systems, they are therefore used to achieve a new parallel plurality voting algorithm by using (n/log n) processors on EREW shared-memory PRAM. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Web Algorithm search engine based network modelling of Malaria Transmission by Eze, Monday Okpoto

    Published 2013
    “…The model output was validated with UCINET 6.0 as the benchmark system. A root mean square error (RMSE) value of 0.0023 was obtained when the output of the benchmark system is compared with that of the search engine model. …”
    Get full text
    Get full text
    Get full text
    Thesis