Search Results - (( java application optimization algorithm ) OR ( using iterative proposed algorithm ))
Search alternatives:
- application optimization »
- proposed algorithm »
- java application »
- using iterative »
-
1
Algorithm solution for space-fractional diffusion equations
Published 2020“…Based on numerical results of the proposed iterative method, it can be concluded that the proposed iterative method is superior to the FSAOR and HSAOR iterative method.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Iterative closed-loop identification of MIMO systems using ARX-based Leaky Least Mean Square Algorithm
Published 2014Get full text
Get full text
Conference or Workshop Item -
3
Multi-objective service restoration in distribution networks using genetic algorithm
Published 2013“…Another proposed technique is implemented to improve the penalty strategy to enhance the performance of algorithm and reduce the convergence iteration. …”
Get full text
Get full text
Thesis -
4
An adaptively switching iteration strategy for population based metaheuristics / Nor Azlina Ab. Aziz
Published 2017“…An iteration strategy is able to improve the performance of a parent algorithm and cause another parent algorithm to perform badly. …”
Get full text
Get full text
Get full text
Thesis -
5
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
6
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
Get full text
Get full text
Conference or Workshop Item -
7
MULTIVARIABLE CLOSED-LOOP SYSTEM IDENTIFICATION USING ITERATIVE LEAKY LEAST MEAN SQUARES METHOD
Published 2017“…In this research. novel algorithms have been developed to: (I) isolate the less interacting channe Is using a modified partial correlation algorithm. (2) achieve unbiased and consistent parameter estimates using an iterative LLMS algorithm and (3) develop parsimonious models for closed-loop MIMO systems. …”
Get full text
Get full text
Thesis -
8
Active force control with iterative learning control algorithm for a vehicle suspension
Published 2013“…ILC algorithm is implemented into AFC-based control scheme to reduce its complexity and hence faster response, by replacing the use of artificial intelligence (Al) method as proposed by previous researcher. …”
Get full text
Get full text
Thesis -
9
Iteration strategy and ts effect towards the performance of population based metaheuristics
Published 2020“…The finding shows that iteration strategy can influence the performance of an algorithm and the best iteration strategy is unique to its parent algorithm. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
On the spectra efficiency of low-complexity and resolution hybrid precoding and combining transceivers for mmWave MIMO systems
Published 2019“…Simulation results demonstrate that the proposed LcHPC-SdMP algorithm performs very close to its full-digital precoding and achieves better spectral efficiency over state-of-the-art algorithms with a substantially reduced number of iteration than the recently proposed schemes. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
-
12
Repetitive mutations in genetic algorithm for software test data generations
Published 2022“…Then, a repetitive mutation technique for GA was designed and implemented in a numerical simulation using C++ language. Finally, the evaluation phase that compares the outcome of the proposed technique against existing studies in terms of the number of iterations for test data generations. …”
Get full text
Get full text
Thesis -
13
Off-the-shelf indoor localization system using radio frequency for wireless local area network
Published 2018“…The proposed system is enhanced further by using offline clustering (OC) algorithm to reduce the data size of radio map and improve the system’s accuracy. …”
Get full text
Get full text
Thesis -
14
Stereo Matching Algorithm Based On Per Pixel Difference Adjustment, Iterative Guided Filter And Graph Segmentation
Published 2017“…Therefore, this paper proposes an improved algorithm to overcome these limitations. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
16
Parameter extraction of photovoltaic module using hybrid evolutionary algorithm
Published 2023Conference Paper -
17
Hybrid of firefly algorithm and pattern search for solving optimization problems
Published 2018“…The pattern search is an optimization algorithm that further optimizes the values obtained in the maximum iterations of standard FA. …”
Get full text
Get full text
Article -
18
Multiple equations model selection algorithm with iterative estimation method
Published 2016“…There have been various procedures suggested to date, whether through manual or automated selections, to choose the best model.This study nonetheless focuses on an automated selection for multiple equations model with the use of iterative estimation method. In particular, an algorithm on model selection for seemingly unrelated regression equations model using iterative feasible generalized least squares estimation method is proposed. …”
Get full text
Get full text
Get full text
Article -
19
-
20
On the security of digital signature protocol based on iterated function systems.
Published 2011“…This new system can be expected to have at least the same computational security against some known attacks. A Diffie-Hellman algorithm is used to improve the security of the proposed protocol by generating the number of iteration that is used to find the attractor of the iterated function system, which is used to calculate the public key and the signature. …”
Get full text
Get full text
Get full text
Article
