Search Results - (( parallel distribution factor algorithm ) OR ( parallel distribution means algorithm ))
Search alternatives:
- parallel distribution »
- distribution factor »
- distribution means »
- factor algorithm »
- means algorithm »
-
1
Parallel power load abnormalities detection using fast density peak clustering with a hybrid canopy-K-means algorithm
Published 2025“…Parallel power loads anomalies are processed by a fast-density peak clustering technique that capitalizes on the hybrid strengths of Canopy and K-means algorithms all within Apache Mahout's distributed machine-learning environment. …”
Article -
2
Implementation of Parallel K-Means Algorithm to Estimate Adhesion Failure in Warm Mix Asphalt
Published 2020“…The results showed that the PKIP algorithm decreases the execution time up to 30 to 46 if compared with the sequential k means algorithm when implemented using multiprocessing and distributed computing. …”
Get full text
Get full text
Article -
3
Investigation on the dynamic of computation of semi autonomous evolutionary computation for syntactic optimization of a set of programming codes
Published 2007“…Genetic Algorithm as one of the Evolutionary Computation method improve the execution of parallel programming codes by optimizing the number of processors and the distribution of data. …”
Get full text
Get full text
Research Report -
4
Improved black-winged kite algorithm and finite element analysis for robot parallel gripper design
Published 2024“…The Good Point Set (GPS), nonlinear convergence factor, and adaptive t-distribution method improve BKA, which enhances exploration and exploitation performance, convergence speed, and solution quality. …”
Get full text
Get full text
Get full text
Article -
5
Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer
Published 2023“…It is because the parallel mechanism is able to handle high-speed streaming data. …”
Get full text
Get full text
Thesis -
6
Design and analysis of management platform based on financial big data
Published 2023“…In addition, a financial data management platform based on distributed Hadoop architecture is designed, which combines MapReduce framework with the fuzzy clustering algorithm and the local outlier factor (LOF) algorithm, and uses MapReduce to operate in parallel with the two algorithms, thus improving the performance of the algorithm and the accuracy of the algorithm, and helping to improve the operational efficiency of enterprise financial data processing. …”
Get full text
Get full text
Get full text
Article -
7
Dengue outbreak prediction: hybrid meta-heuristic model
Published 2018Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Optimization of Workload Allocation Problem in a Network of Heterogeneous Computer Systems
Published 2005“…A new algorithm of workload allocation scheme using First Come First Serve discipline in conjunction with optimization of GE queueing systems is proposed for minimizing mean queue length and mean response time in a network of computer systems. …”
Get full text
Get full text
Get full text
Thesis -
9
Extreme air pollutant data analysis using classical and Bayesian approaches
Published 2015“…MTM algorithm is an extension of MH algorithm, designed to improve the convergence of MH algorithm by performing parallel computation. …”
Get full text
Get full text
Thesis -
10
Investigation of QAM based on mean square error (MSE) channel estimation (CE) for MIMO-OFDM pilot based system / Mohd Ariff Ibrahim
Published 2013“…The Least Square Error (LSE) and Discrete Fourier Transform (DFT) BER are not shown because these are other CE techniques and Mean Square Error (MSE) is used just by applying the algorithm from Least Square Error (LSE) and converted into MSE with combination of few complex matrix correlations.…”
Get full text
Get full text
Thesis -
11
Generic DNA encoding design scheme to solve combinatorial problems
Published 2015“…The complexity of combinatorial problems is classified as NP meaning that algorithms are yet to exist to efficiently solve the problem. …”
Get full text
Get full text
Thesis -
12
Communication and computation rate-cheating problems in divisible load scheduling: revisited
Published 2015“…In the real applications, the processors may cheat the algorithm which means that the processors might not report their true computation or communication rates. …”
Get full text
Get full text
Conference or Workshop Item -
13
An adaptive controller of hydro generators for smart grid application in Malaysia
Published 2010“…The controller has been modeled considering the existing Malaysia' distribution network of mini hydro power plant connected in parallel to the grid. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Conjunctions in biological neural architectures for visual pose estimation / Tom´As Maul
Published 2006“…A highly parallel approach based on simple inter-map conjunctions, or correspondence distributions, is chosen and tested on synthetic and real patterns. …”
Get full text
Get full text
Thesis -
15
-
16
-
17
3d Morphing And Shape Transformation Using Slices
Published 2009“…Most of the existing shape transformation algorithms involve a lot of user intervention, do not scale well when the number of input objects is more than two and are not scalable in parallel and distributed computing environment whenever needed. …”
Get full text
Get full text
Thesis -
18
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
Get full text
Get full text
Thesis -
19
-
20
Multi-criteria divisible load scheduling in binary tree network
Published 2016“…The traditional divisible load scheduling assumes that the processors report their true computation and communication rates, i.e., they do not cheat the algorithm. In the real applications, the processors may cheat the algorithm, which means, the processors might not report their true computation or communication rates. …”
Get full text
Get full text
Thesis
