Search Results - (( java implication based algorithm ) OR ( net generation process algorithm ))

Refine Results
  1. 1

    Fast clock tree generation using exact zero skew clock routing algorithm by Reaz, Mamun Ibn, Ibrahimy, Muhammad Ibn, Amin, Nowshad

    Published 2009
    “…The methodology has been tested using a real design database and resulting in a significant improvement in the through put time required to complete the clock tree generation. This improvement is attributed to the ability to generate clock tree on much smaller portions of clock nets that supports of speeding up the clock tree generation process in IC design. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3
  4. 4

    Performance Analysis of Swarm Intelligence-Based Routing Protocol for Mobile Ad Hoc Network and Wireless Mesh Networks by Moghanjoughi, Ayyoub Akbari

    Published 2009
    “…Besides, it is able to decrease average end-to-end packet delay compared to other algorithms by showing its efficiency. IANRA has decreased average end-to-end packet delay by 31.16%, 58.20% and 48.40% in MANET scenario 52.86%, 64.52% and 62.86% by increasing packet generation rate in WMNs compared to AntHocNet, AODV and B-AntNet routing algorithms respectively with increased network load. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Zero skew clock routing for fast clock tree generation by Reaz, Mamun Ibn, Amin, Nowshad, Ibrahimy, Muhammad Ibn, Mohamad-Yasin, F., Mohammad, A.

    Published 2008
    “…The methodology has been tested using a real design database and resulting in a significant improvement in the through put time required to complete the clock tree generation. This improvement is attributed to the ability to generate clock tree on much smaller portions of clock nets that supports of speeding up the clock tree generation process in IC design. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6

    Evolving character animation by Zakaria, M. Nordin

    Published 2001
    “…Neural net is used to constrain the generated motions. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7
  8. 8

    The classification of wink-based eeg signals by means of transfer learning models by Jothi Letchumy, Mahendra Kumar

    Published 2021
    “…It was demonstrated from the simulation investigation that the CWT model could yield a better signal transformation amongst the preprocessing algorithms. In addition, amongst the eighteen TL models evaluated based on the CWT transformation, fourteen was f ound to be able to extract the features reasonable, i.e., VGG16, VGG19, ResNet101, ResNet101 V2, ResNet152, ResNet152 V2, Inception V3, Inception ResNet V2, Xception, MobileNetV2, DenseNet 121, DenseNet 169, NasNetMobile and NasNetLarge. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Pairwise testing tools based on hill climbing algorithm (PTCA) by Lim, Seng Kee

    Published 2014
    “…To reduce the test cases generated during testing process, combinatorial algorithms which consisting Hill Climbing algorithm and T Way Combination algorithm as described in twayGenerator (Kamal Zuhairi Zamli, 2007) have been studied and reviewed. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  10. 10

    Immune network algorithm in monthly streamflow prediction at Johor river by Mat Ali, Nur Izzah, Abdul Malik, Marlinda, Ismail , Amelia Ritahani

    Published 2014
    “…The model of Immune Network Algorithm used in this study is aiNet. The training process in aiNet is partly inspired by clonal selection principle and the other part uses antibody interactions for removing redundancy and finding data patterns. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    Enhanced marking process (EMP) for constructing dominating set in mobile ad-hoc networks with unidirectional links by Waheed, Bassam M. S., Mohd Ali, Borhanuddin, Khatun, Sabira, Mohd Sidek, Roslina

    Published 2014
    “…An enhanced distributed algorithm is presented that is based on the marking process which is has been introduced in earlier work. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Immune network algorithm in monthly streamflow prediction at Johor river by Ali N.I.M., Malek M.A., Ismail A.R.

    Published 2023
    “…The model of Immune Network Algorithm used in this study is aiNet. The training process in aiNet is partly inspired by clonal selection principle and the other part uses antibody interactions for removing redundancy and finding data patterns. …”
    Article
  13. 13
  14. 14

    Immune network algorithm in monthly streamflow prediction at Johor river by Mat Ali, Nur Izzah, Abdul Malek, Marlinda, Ismail, Amelia Ritahani

    Published 2015
    “…The model of Immune Network Algorithm used in this study is aiNet. The training process in aiNet is partly inspired by clonal selection principle and the other part uses antibody interactions for removing redundancy and finding data patterns. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    The development of integrated planning and scheduling framework for dynamic and reactive environment of complex manufacturing problem by Zakaria, Zalmiyah, Deris, Safaai, Mat Yatim, Safie, Othman, Muhamad Razib

    Published 2008
    “…Secondly, in Chapter 2 we described the modeling of the real world manufacturing processes using Petri Nets. We present two models of manufacturing process, namely machine model and process model. …”
    Get full text
    Get full text
    Get full text
    Monograph
  17. 17
  18. 18
  19. 19
  20. 20

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…The website tested by many users that use to register and upload them own data and files using them own e-mails and the unique key that generated after completing the registration. We used to insure for the users data and files in our website by checking the process of our generated system (SCDS) and we got match results for the same files in case of encryption and decryption process.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis