Search Results - (( ((using factor) OR (using vector)) parallel algorithm ) OR ( java application using algorithm ))

Refine Results
  1. 1

    Parallel power load abnormalities detection using fast density peak clustering with a hybrid canopy-K-means algorithm by Al-Jumaili A.H.A., Muniyandi R.C., Hasan M.K., Singh M.J., Paw J.K.S., Al-Jumaily A.

    Published 2025
    “…After classifying the time set using the canopy with the K-means algorithm and the vector representation weighted by factors, the clustering impact is assessed using purity, precision, recall, and F value. …”
    Article
  2. 2
  3. 3

    A parallel version of a binary method and vector addition chains precomputation for exponentiation in RSA / Siti Khatijah Nor Abdul Rahim and Siti Rozanae Ismail by Abdul Rahim, Siti Khatijah Nor, Ismail, Siti Rozanae

    Published 2006
    “…However, we also constructed an algorithm for a parallel version of Vector Addition Chains to enhance the performance. …”
    Get full text
    Get full text
    Research Reports
  4. 4

    Parallel execution of distributed SVM using MPI (CoDLib) by Salleh N.S.M., Suliman A., Ahmad A.R.

    Published 2023
    “…Instead of using a single machine for parallel computing, multiple machines in a cluster are used. …”
    Conference paper
  5. 5

    Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System by Aljanabi, Mohammad, Mohd Arfian, Ismail, Mezhuyev, Vitaliy

    Published 2020
    “…The proposed method combined the improved teaching-learning-based optimisation (ITLBO) algorithm, improved parallel JAYA (IPJAYA) algorithm, and support vector machine. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    A parallel prevention algorithm for black hole attacks in MANET by Yaakub, Abdul Razak, Ghathwan, Khalil I.

    Published 2015
    “…In this paper, we propose a parallel algorithm for MANETs that optimizes both routing discovery and security in an Ad Hoc On Demand Distance Vector (AODV). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Parallel Processing of RSAAlgorithm Using MPI Library by Wan Dagang, Wan Rahaya

    Published 2006
    “…This report explains the project of developing Parallel Processing of RSA Algorithm Using MPI Library. …”
    Get full text
    Get full text
    Final Year Project
  8. 8

    Intelligent classification algorithms in enhancing the performance of support vector machine by Alwan, Hiba Basim, Ku-Mahamud, Ku Ruhana

    Published 2019
    “…Eight benchmark datasets from UCI were used in the experiments to validate the performance of the proposed algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Parallel batch self-organizing map on graphics processing unit using CUDA by Daneshpajouh, H., Delisle, P., Boisson, J.-C., Krajecki, M., Zakaria, N.

    Published 2018
    “…The most computationally expensive parts of its training algorithm (such as steps to compute distance between each data vector and neuron, and determining the Best Matching Unit based on minimum distance) are identified and mapped on GPU to be processed in parallel. …”
    Get full text
    Get full text
    Article
  10. 10

    Parallel batch self-organizing map on graphics processing unit using CUDA by Daneshpajouh, H., Delisle, P., Boisson, J.-C., Krajecki, M., Zakaria, N.

    Published 2018
    “…The most computationally expensive parts of its training algorithm (such as steps to compute distance between each data vector and neuron, and determining the Best Matching Unit based on minimum distance) are identified and mapped on GPU to be processed in parallel. …”
    Get full text
    Get full text
    Article
  11. 11

    Parallel metaheuristic algorithm for route planning using CUDA by Looi, Daniel Jun Jie

    Published 2025
    “…This research will be focusing on developing a Parallel Metaheuristic Algorithm for Route Planning using CUDA to improve the efficiency and performance of route planning. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12

    Parallel implementation on improved error signal of backpropagation algorithm by Mohd Aris, Teh Noranis

    Published 2001
    “…The experiments are implemented using the Sequent Symmetry SE30 parallel machine. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Enhancing performance of XTS cryptography mode of operation using parallel design by Ahmed Alomari, Mohammad

    Published 2009
    “…In addition, the parallel XTS mode was also simulated using Twofish and RC6 encryption algorithms. …”
    Get full text
    Get full text
    Thesis
  14. 14

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  15. 15

    Image classification using two dimensional wavelet coefficients with parallel computing by Ong, Yew Fai

    Published 2020
    “…This research algorithm demonstrated a very promising result with Support Vector Machines, this algorithm produces a 90% of accuracies whereas the decision tree algorithm gets 100% accuracies. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16
  17. 17
  18. 18
  19. 19

    Super resolution imaging using modified lanr based on separable filtering by Somadina, Ike Chidiebere

    Published 2019
    “…The underlying idea is to process and reconstruct information in low and high frequency sub-bands based on separable property of neighbourhood filtering to achieve fast parallel and vectorized operation, while enhancing algorithmic performance by reducing computational burden resulting from computing the weighted function of every pixel for each pixel in an image. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems by Mohammad Khamees Khaleel, Alsajri

    Published 2022
    “…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
    Get full text
    Get full text
    Thesis