Search Results - (( net optimization method algorithm ) OR ( java application reoptimize algorithm ))

Refine Results
  1. 1

    The Determination of Pile Capacity Using Artificial Neural-net: An Optimization Approach by Ab. Malik, Rosely, Jamil S., Mohamed

    Published 2001
    “…In this study, the developed algorithm is further expanded to include computation of the weight-matrix of a sequential associative feedback-type neural net model for the determination of service load of a single pile is introduced. …”
    Get full text
    Get full text
    Article
  2. 2
  3. 3
  4. 4

    Using Electromagnetism-like algorithm and genetic algorithm to optimize time of task scheduling for dual manipulators by Abed I.A., Sahari K.S.M., Koh S.P., Tiong S.K., Jagadeesh P.

    Published 2023
    “…A method based on Electromagnetism-Like algorithm (EM) and Genetic Algorithm (GA) is proposed to determine the time-optimal task scheduling for dual robot manipulators. …”
    Conference paper
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9

    An Enhanced Simulated Annealing Routing Algorithm for Semi-Diagonal Torus Network by Noraziah, Adzhar, Shaharuddin, Salleh

    Published 2017
    “…While this algorithm guarantees to find the shortest path for each single net, if it exists, each routed net will form obstacle for later paths. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14

    An efficient innovative method to decrease routing table size in packet switched networks by Baygi, Maassoumeh Javadi, Ramli, Abdul Rahman, Zaeri, Bahram, Mohd Ali, Borhanuddin

    Published 2013
    “…Statistical analysis of results confirms that the new method can significantly reduce the average packet delivery time and rate of convergence to the optimal route when compared with standard AntNet.…”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Analysis of optimizers on AlexNet architecture for face biometric authentication system by Mat Ariff, Noor Azwana, Ismail, Amelia Ritahani, Abdul Aziz, Normaziah, Amir Hussin, Amir 'Aatieff

    Published 2022
    “…There have been many techniques suggested for biometric authentication algorithms, however, it can be observed that the Deep Learning approach is significantly more effective and secure than other methods, specifically Convolutional Neural Networks (CNN) with AlexNet architecture for face recognition. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  16. 16
  17. 17

    Routing problem in rectangular mesh network using Dijkstra’s based Greedy method by Noraziah, Adzhar, Shaharuddin, Salleh, Yuhani, Yusof, Muhammad Azrin, Ahmad

    Published 2018
    “…In this research, Dijkstra’s algorithm is used to establish the shortest connection for each net. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Routing problem in rectangular mesh network using shortest path based Greedy method by Noraziah, Adzhar, Shaharuddin, Salleh, Yuhani, Yusof, Muhammad Azrin, Ahmad

    Published 2019
    “…In this research, Dijkstra's algorithm is used to establish the shortest connection for each net. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20

    A Surrogate Assisted Quantum-Behaved Algorithm for Well Placement Optimization by Islam, J., Nazir, A., Hossain, M.M., Alhitmi, H.K., Kabir, M.A., Jallad, A.-H.M.

    Published 2022
    “…Various traditional and non-traditional optimization algorithms have been developed to resolve these difficulties. …”
    Get full text
    Get full text
    Article