Search Results - (( java application optimization algorithm ) OR ( using iterative proposed algorithm ))

Refine Results
  1. 1

    Algorithm solution for space-fractional diffusion equations by Agus Sunarto, Jumat Sulaiman

    Published 2020
    “…Based on numerical results of the proposed iterative method, it can be concluded that the proposed iterative method is superior to the FSAOR and HSAOR iterative method.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2
  3. 3

    Multi-objective service restoration in distribution networks using genetic algorithm by Moazami, Ehsan

    Published 2013
    “…Another proposed technique is implemented to improve the penalty strategy to enhance the performance of algorithm and reduce the convergence iteration. …”
    Get full text
    Get full text
    Thesis
  4. 4

    An adaptively switching iteration strategy for population based metaheuristics / Nor Azlina Ab. Aziz by Nor Azlina, Ab. Aziz

    Published 2017
    “…An iteration strategy is able to improve the performance of a parent algorithm and cause another parent algorithm to perform badly. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    MULTIVARIABLE CLOSED-LOOP SYSTEM IDENTIFICATION USING ITERATIVE LEAKY LEAST MEAN SQUARES METHOD by MOHAMED OSMAN, MOHAMED ABDELRAHIM

    Published 2017
    “…In this research. novel algorithms have been developed to: (I) isolate the less interacting channe Is using a modified partial correlation algorithm. (2) achieve unbiased and consistent parameter estimates using an iterative LLMS algorithm and (3) develop parsimonious models for closed-loop MIMO systems. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Active force control with iterative learning control algorithm for a vehicle suspension by Rosmazi, Rosli

    Published 2013
    “…ILC algorithm is implemented into AFC-based control scheme to reduce its complexity and hence faster response, by replacing the use of artificial intelligence (Al) method as proposed by previous researcher. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Iteration strategy and ts effect towards the performance of population based metaheuristics by Nor Azlina, Ab. Aziz, Nor Hidayati, Abdul Aziz, Azlan, Abd Aziz, Tasiransurini, Abdul Rahman, Wan Zakiah, Wan Ismail, Zuwairie, Ibrahim

    Published 2020
    “…The finding shows that iteration strategy can influence the performance of an algorithm and the best iteration strategy is unique to its parent algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    On the spectra efficiency of low-complexity and resolution hybrid precoding and combining transceivers for mmWave MIMO systems by Uwaechia, Anthony Ngozichukwuka, Mahyuddin, Nor Muzlifah, Mohd Fadzil, Ain, Abdul) Latiff, Nurul Muazzah, Za'bah, Nor Farahidah

    Published 2019
    “…Simulation results demonstrate that the proposed LcHPC-SdMP algorithm performs very close to its full-digital precoding and achieves better spectral efficiency over state-of-the-art algorithms with a substantially reduced number of iteration than the recently proposed schemes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Repetitive mutations in genetic algorithm for software test data generations by Kadhim, Mohammed Majid

    Published 2022
    “…Then, a repetitive mutation technique for GA was designed and implemented in a numerical simulation using C++ language. Finally, the evaluation phase that compares the outcome of the proposed technique against existing studies in terms of the number of iterations for test data generations. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Off-the-shelf indoor localization system using radio frequency for wireless local area network by Alhammadi, Abdulraqeb Shaif Ahmed

    Published 2018
    “…The proposed system is enhanced further by using offline clustering (OC) algorithm to reduce the data size of radio map and improve the system’s accuracy. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  16. 16
  17. 17

    Hybrid of firefly algorithm and pattern search for solving optimization problems by Wahid, Fazli, Ghazali, Rozaida

    Published 2018
    “…The pattern search is an optimization algorithm that further optimizes the values obtained in the maximum iterations of standard FA. …”
    Get full text
    Get full text
    Article
  18. 18

    Multiple equations model selection algorithm with iterative estimation method by Kamarudin, Nur Azulia, Ismail, Suzilah

    Published 2016
    “…There have been various procedures suggested to date, whether through manual or automated selections, to choose the best model.This study nonetheless focuses on an automated selection for multiple equations model with the use of iterative estimation method. In particular, an algorithm on model selection for seemingly unrelated regression equations model using iterative feasible generalized least squares estimation method is proposed. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    On the security of digital signature protocol based on iterated function systems. by M. G. AL-Saidi, Nadia, Md. Said, Mohamad Rushdan

    Published 2011
    “…This new system can be expected to have at least the same computational security against some known attacks. A Diffie-Hellman algorithm is used to improve the security of the proposed protocol by generating the number of iteration that is used to find the attractor of the iterated function system, which is used to calculate the public key and the signature. …”
    Get full text
    Get full text
    Get full text
    Article