Search Results - (( evolution application system algorithm ) OR ( parallel optimization path algorithm ))
Search alternatives:
- evolution application »
- parallel optimization »
- optimization path »
- system algorithm »
- path algorithm »
-
1
Tool path generation of contour parallel based on ant colony optimisation
Published 2016“…An Ant Colony Optimisation (ACO) method is used to optimize the tool path length because of its capability to find the shortest tool path length. …”
Get full text
Get full text
Article -
2
Minimizing machining airtime motion with an ant colony algorithm
Published 2016Get full text
Get full text
Article -
3
-
4
Restoration planning strategy of transmission system based on optimal energizing time of sectionalizing islands / Dian Najihah Abu Talib
Published 2019“…There are two discrete optimization techniques used in this work, which are the Artificial Bee Colony algorithm and Evolutionary Programming. …”
Get full text
Get full text
Get full text
Thesis -
5
Two level Differential Evolution algorithms for ARMA parameters estimatio
Published 2013Get full text
Get full text
Get full text
Proceeding Paper -
6
-
7
Special protection and control scheme based on generation rescheduling using differential evolution and electromagnetism-like algorithm
Published 2016“…This SPCS strategy, novel in the generation rescheduling application, is called as Differential Evolution with Adaptive Mutation (DEAM). …”
Get full text
Get full text
Thesis -
8
-
9
Text steganalysis using evolution algorithm approach
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
10
-
11
-
12
Mixed Unscented Kalman Filter and differential evolution for parameter identification
Published 2013“…Next, its parameters are identified using mixed Unscented Kalman Filter (UKF) and Differential Evolution (DE) based on the experimental data. DE algorithm is integrated into the UKF algorithm to optimize the Kalman gain obtained. …”
Get full text
Get full text
Get full text
Article -
13
An investigation of packet scheduling algorithms for long term evolution-advanced
Published 2012Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
An improved component carrier selection algorithm for downlink long term evolution advanced
Published 2014“…Results obtained via simulation have demonstrated the efficacy of the proposed algorithm in optimizing the system capacity without compromising the Quality of Service (QoS) requirements of delay-sensitive Guaranteed Bit Rate (GBR) application.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
15
-
16
A novel large-bit-size architecture and microarchitecture for the implementation of Superscalar Pipeline VLIW microprocessors
Published 2008“…Different adder architectures are investigated for suitability on synthesis implementation of large data bus size adder for efficient usage within the ALU. An adder algorithm using repetitive constructs in a parallel algorithm that allows for efficient and optimal synthesis for large data bus size is proposed as a suitable implementation for the adder within the ALU. …”
Get full text
Thesis -
17
Optimized differential evolution algorithm for linear frequency modulation radar signal denoising
Published 2013“…Both architectures gave precise results for different selections of chirp rate that could fit with system specifications. The main contention of this thesis is to investigate the development of new optimization technique based on Differential Evolution algorithm (DE), applied for radar signal denoising application. …”
Get full text
Get full text
Thesis -
18
-
19
Optimization of handover algorithms in 3GPP long term evolution system
Published 2011Get full text
Get full text
Get full text
Proceeding Paper -
20
Nonlinear identification of a small scale unmanned helicopter using optimized NARX network with multiobjective differential evolution
Published 2014“…The need for a high fidelity model for design,analysis and implementation of an unmanned helicopter system(UHS) in various emerging civil applications cannot be underestimated. …”
Get full text
Get full text
Get full text
Article
