Search Results - (( java implementation some algorithm ) OR ( patterns using parallel algorithm ))

Refine Results
  1. 1

    Parallel implementation on improved error signal of backpropagation algorithm by Mohd Aris, Teh Noranis

    Published 2001
    “…The experiments are implemented using the Sequent Symmetry SE30 parallel machine. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    High performance hierarchical torus network under matrix transpose traffic patterns by Rahman, M.M. Hafizur, Susumu, Horiguchi

    Published 2004
    “…In this paper, we present a deadlock-free routing algorithm for the HTN using virtual channels and evaluate the network’s dynamic communication performance under matrix transpose traffic, using the proposed routing algorithm. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  5. 5

    Enhancement of parallel thinning algorithm for handwritten characters using neural network by Engkamat, Adeline

    Published 2005
    “…Thus, this project presents a framework for the implementation of a multilayer perceptron neural network with backpropagation algorithm, in the Parker thinning algorithm in order to produce a fast fully parallel thinning algorithm. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Enhanced Storage Mechanism for Secured Parallel Network File System by K J, Latesh Kumar

    Published 2018
    “…The proposed techniques resulted synchronous LEASE file locking, capturing of state of locks and layouts, Kerberos secured the pNFS locks and layouts on storage, new algorithm enabled the scalable data compression using data block size compression algorithm and better dynamic data protection using RAID.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Parallel implementation on improved error signal of backpropagation algorithm by Mohd Aris, Teh Noranis, Sulaiman, Md. Nasir, Mohd Saman, Md. Yazid, Othman, Mohamed

    Published 2002
    “…Further study on the improved BP algorithm is carried out on many processors, which is implemented using the Sequent Symmetry SE30 machine. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer by Iqbal Basheer, Muhammmad Yunus

    Published 2023
    “…The performance tests are also conducted to assess whether each algorithm can detect most of the true anomalies. The data is supplied using IoT devices, and benchmark datasets are also presented to test the algorithm's performance.…”
    Get full text
    Get full text
    Thesis
  9. 9

    Deterministic Automatic Test Pattern Generation for Built-In Self Test System by Mohammed Khalid, Muhammad Nazir

    Published 2006
    “…To illustrate that, the DATPG algorithm for digital combinational circuit using VHDL language is designed to generate the test patterns. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  11. 11

    Dynamic communication performance of the TESH network under nonuniform traffic patterns by Rahman, M.M. Hafizur, Inoguchi, Yasushi, Sato, Yukinori, Miura, Yasuyuki, Horiguchi, Susumu

    Published 2009
    “…In this paper, we evaluate the dynamic communication performance of the TESH network using dimension order routing algorithm under various nonuniform traffic patterns. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Dynamic communication performance of a TESH network under the nonuniform traffic patterns by Rahman, M.M. Hafizur, Inoguchi, Yasushi, Sato, Yukinori, Miura, Yasuyuki, Horiguchi, Susumu

    Published 2008
    “…In this paper, we present a deadlock-free routing algorithm for the TESH network using 2 virtual channels - 2 being the minimum number for dimension-order routing - and evaluate the network's dynamic communication performance under various nonuniform traffic patterns, using the proposed routing algorithm. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  13. 13

    Probabilistic ensemble fuzzy ARTMAP optimization using hierarchical parallel genetic algorithms by Loo, C.K., Liew, W.S., Seera, M., Lim, Einly

    Published 2015
    “…This was achieved by mitigating convergence in the genetic algorithms by employing a hierarchical parallel architecture. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Dynamic communication performance of a hierarchical torus network under non-uniform traffic patterns by Rahman, M.M. Hafizur, Horiguchi, Susumu

    Published 2004
    “…In this paper, we present a deadlock-free routing algorithm for the HTN using 3 virtual channels and evaluate the network's dynamic communication performance under three non-uniform traffic patterns, using the proposed routing algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    TTN: a high performance hierarchical interconnection network for massively parallel computers by Rahman, M.M. Hafizur, Inoguchi, Yasushi, Sato, Yukinori, Horiguchi, Susumu

    Published 2009
    “…We also present a deadlock-free routing algorithm for the TTN using four virtual channels and evaluate the network's dynamic communication performance using the proposed routing algorithm under uniform and various non-uniform traffic patterns. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Topology-aware hypergraph based approach to optimize scheduling of parallel applications onto distributed parallel architectures by Koohi, Sina Zangbari

    Published 2020
    “…These complex systems have designed to solve various types of problems from different areas, resulting in high-demanding Heterogeneous Parallel Applications (HPAs). HPAs use parallel processors and assist in parallel execution of tasks with complex interdependency between data and operations. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  20. 20