Search Results - (( global distributions process algorithm ) OR ( parameter evaluation method algorithm ))

Refine Results
  1. 1

    Nomadic people optimizer (NPO) for large-scale optimization problems by Mohamd Salih, Sinan Qahtan

    Published 2019
    “…Three major problems are encountered when designing metaheuristics; the first problem is balancing exploration with exploitation capabilities (which leads to premature convergence or trapping in the local minima), while the second problem is the dependency of the algorithm on the controlling parameters, which are parameters with unknown optimal values. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    SWAT and ANN model hydrological assessment using Malaysia soil data / Khairi Khalid by Khalid, Khairi

    Published 2017
    “…The research aims to evaluate the performance and hydrological response of the Soil Water Assessment Tool (SWAT) process-based model in tropical river basin using Malaysia soil data. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Clock Distribution Network Building Algorithm For Multiple Ips In System On A Chip by Tan , Tze Liang

    Published 2017
    “…In this project, an algorithm is proposed and developed to build the global CDN that is used to distribute the clocks to all partitions in the SoC using the channels available between partitions. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Static and self-scalable filter range selection algorithms for peer-to-peer networks by Kweh, Yeah Lun

    Published 2011
    “…The range will be adjusted and becomes narrower while ensuring the target keys are still within it as the process iterates until the keys have been found. The selfscalable selection algorithm uses dynamic range where the filter range is not preset and is determined by the algorithm itself based on the distribution and the values of the data in the global and local file. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Taguchi-Grey Relational Analysis Method for Parameter Tuning of Multi-objective Pareto Ant Colony System Algorithm by Muthana, Shatha Abdulhadi, Ku Mahamud, Ku Ruhana

    Published 2023
    “…The gray relational grade (GRG) performance metric and the Friedman test were used to evaluate the algorithm’s performance. The Taguchi-GRA method that produced the new values for the algorithm’s parameters was shown to be able to provide a better multi-objective generator maintenance scheduling (GMS) solution. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Evaluation of lightning current parameters using measured lightning induced voltage on distribution power lines by Izadi, Mahdi, Ab Kadir, Mohd Zainal Abidin, Osman, Miszaina

    Published 2019
    “…In this paper, an algorithm had been proposed to evaluate the lightning current parameters using measured voltage from overhead distribution lines based on lightning location obtained from lightning location system. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Statistical fixed range multiple selection algorithm for peer-to-peer system by Kweh, Yeah Lun, Othman, Mohamed, Ahmad, Fatimah, Ibrahim, Hamidah

    Published 2010
    “…A global file with n keys is distributed evenly among p peers in the peer-to-peer network. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Inversed Control Parameter in Whale Optimization Algorithm and Grey Wolf Optimizer for Wrapper-Based Feature Selection: A Comparative Study by Li Yu Yab, Li Yu Yab, Wahid, Noorhaniza, A Hamid, Rahayu

    Published 2023
    “…This comparative study aims to investigate and compare the effectiveness of the inversed control parameter in the proposed methods against the original algorithms in terms of the number of selected features and the classification accuracy. …”
    Get full text
    Get full text
    Article
  11. 11

    Inversed Control Parameter in Whale Optimization Algorithm and Grey Wolf Optimizer for Wrapper-Based Feature Selection: A Comparative Study by Li Yu Yab, Li Yu Yab, Wahid, Noorhaniza, A Hamid, Rahayu

    Published 2023
    “…This comparative study aims to investigate and compare the effectiveness of the inversed control parameter in the proposed methods against the original algorithms in terms of the number of selected features and the classification accuracy. …”
    Get full text
    Get full text
    Article
  12. 12

    Evaluation of Lightning Current Using Inverse Procedure Algorithm. by Ab Kadir, Mohd Zainal Abidin, Izadi, Mahdi, Askari, Mohamad Tolou, Hajikhani, Maryam

    Published 2013
    “…The proposed method considers on all electromagnetic fields components and can evaluate full shape of current, velocity and constant parameters of current models in contrast with previous studies. …”
    Get full text
    Get full text
    Article
  13. 13

    A non-blocking coordinated checkpointing algorithm for message-passing systems by Mansouri, Houssem, Aliouat, Makhlouf, Badache, Nadjib, Khan, Al Sakib Pathan

    Published 2015
    “…The processes synchronize their checkpointing activities so that a globally consistent set of checkpoints is always maintained in the system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14

    Static range multiple selection algorithm for peer-to-peer system by Othman, Mohamed, Kweh, Yeah Lun, Ahmad, Fatimah, Ibrahim, Hamidah

    Published 2011
    “…A global file with n keys is distributed evenly among n peers in the peer-to-peer network. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Deriving global and local integrity rules for a distributed database by Ibrahim, Hamidah

    Published 2001
    “…Our technique referred to as the integrity test generation, derives global and local integrity rules has effectively reduced the cost of constraint checking in a distributed environment.…”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Tree-based contrast subspace mining method by Florence Sia Fui Sze

    Published 2020
    “…Then, the tree-based method, the genetic algorithm based parameter values identification of tree-based method, and followed by the genetic algorithm based tree-based method, for numerical data sets are developed and evaluated. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Evaluating power efficient algorithms for efficiency and carbon emissions in cloud data centers: a review by Uddin, Mueen, Darabidarabkhani, Yasaman, Shah, Asadullah, Memon, Jamshed

    Published 2015
    “…The three algorithms are evaluated for performance using three parameters; power efficiency, cost effectiveness, and amount of CO2 emissions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Performance evaluation of symmetric cryptography algorithm for database system / Mariam Azwa Yazid by Yazid, Mariam Azwa

    Published 2015
    “…Cryptography has been proven to be the best method to secure a database. However there are many types of cryptography algorithm that has been established in the market. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Distance vector-hop range-free location algorithm for wireless sensor network by Zazali, Azyyati Adiah

    Published 2015
    “…This has caused the tasks for each sensor node to be permanently fixed, thus causing the overall process of the localization algorithm to be complex. …”
    Get full text
    Get full text
    Thesis