Search Results - (( normal evaluation method algorithm ) OR ( parallel optimization path algorithm ))
Search alternatives:
- parallel optimization »
- normal evaluation »
- evaluation method »
- optimization path »
- method algorithm »
- path algorithm »
-
1
Tool path generation of contour parallel based on ant colony optimisation
Published 2016“…An Ant Colony Optimisation (ACO) method is used to optimize the tool path length because of its capability to find the shortest tool path length. …”
Get full text
Get full text
Article -
2
Minimizing machining airtime motion with an ant colony algorithm
Published 2016Get full text
Get full text
Article -
3
-
4
Restoration planning strategy of transmission system based on optimal energizing time of sectionalizing islands / Dian Najihah Abu Talib
Published 2019“…There are two discrete optimization techniques used in this work, which are the Artificial Bee Colony algorithm and Evolutionary Programming. …”
Get full text
Get full text
Get full text
Thesis -
5
The normalized random map of gradient for generating multifocus image fusion
Published 2020“…It successes to eliminate the mathematical and algorithm problems. Furthermore, the evaluation of proposed method based on the fused image quality. …”
Get full text
Get full text
Get full text
Article -
6
A novel large-bit-size architecture and microarchitecture for the implementation of Superscalar Pipeline VLIW microprocessors
Published 2008“…Different adder architectures are investigated for suitability on synthesis implementation of large data bus size adder for efficient usage within the ALU. An adder algorithm using repetitive constructs in a parallel algorithm that allows for efficient and optimal synthesis for large data bus size is proposed as a suitable implementation for the adder within the ALU. …”
Get full text
Thesis -
7
Performance evaluation of symmetric cryptography algorithm for database system / Mariam Azwa Yazid
Published 2015“…This research evaluates the performance of three different symmetric cryptography algorithms. …”
Get full text
Get full text
Thesis -
8
Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream
Published 2023“…The results indicate that the AGMB algorithm outperformed existing benchmark algorithms in terms of predefined evaluation criteria with an overall 72% accuracy compared to benchmark algorithms which is 11 % only. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
The effect of dose calculation algorithms on the normal tissue complication probability values of thoracic cancer
Published 2015“…Four treatment plans are created and DVHs are evaluated based on criteria of acceptance level. NTCP values for thorax plan one and two are evaluated by using different algorithm. …”
Get full text
Get full text
Monograph -
10
Application of genetic algorithm methods to optimize flowshop sequencing problem
Published 2008“…Genetic algorithm method is methods that follow the natural concept. …”
Get full text
Get full text
Undergraduates Project Papers -
11
Analysis of tumour control probability, normal tissue complication probability and isotoxic effects for prostate cancer
Published 2016“…Variation in evaluation method will not give similar findings even same data is used. …”
Get full text
Get full text
Monograph -
12
Dynamic robust bootstrap method based on LTS estimators
Published 2009“…In order to make reliable inferences about the parameters of a model, require that the parameter estimates are normally distributed. Nevertheless, in real situations, many estimates are not normal and the use of bootstrap method is more appropriate as it does not rely on the normality assumption. …”
Get full text
Get full text
Article -
13
Realization Of The 1D Local Binary Pattern (LBP) Algorithm In Raspberry Pi For Iris Classification Using K-NN Classifier
Published 2018“…Firstly, the 1D-LBP algorithm is used to extract the features of the normalized iris images and save the data in a text file according to the subject and the combinations to evaluate for the next stage. …”
Get full text
Get full text
Monograph -
14
-
15
-
16
A 'snowflake' geometrical representation for optimised degree six 3-modified chordal ring networks
Published 2016“…A tree visualisation was constructed based on its connectivity to enable the generation of formulae for optimal diameter and average optimal path lengths. …”
Get full text
Get full text
Conference or Workshop Item -
17
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
Get full text
Get full text
Get full text
Thesis -
18
A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network
Published 2023“…This thesis proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. The research is divided into three parts, which are (1) dataset development, (2) algorithm development, and (3) algorithm performance evaluation. …”
text::Thesis -
19
-
20
A selective approach for energy-aware video content adaptation decision-taking engine in android based smartphone
Published 2019“…Subjective evaluation by selected respondents are also has been made using Absolute Category Rating method as recommended by ITU to evaluate EnVADE algorithm in term of QoE. …”
Get full text
Get full text
Get full text
Get full text
Thesis
