Search Results - (( parallel distribution means algorithm ) OR ( parallel optimization path algorithm ))*

Refine Results
  1. 1

    Tool path generation of contour parallel based on ant colony optimisation by Abdullah, Haslina, Ramli, Rizauddin, Abd Wahab, Dzuraidah, Abu Qudeiri, Jaber

    Published 2016
    “…An Ant Colony Optimisation (ACO) method is used to optimize the tool path length because of its capability to find the shortest tool path length. …”
    Get full text
    Get full text
    Article
  2. 2

    Parallel power load abnormalities detection using fast density peak clustering with a hybrid canopy-K-means algorithm by Al-Jumaili A.H.A., Muniyandi R.C., Hasan M.K., Singh M.J., Paw J.K.S., Al-Jumaily A.

    Published 2025
    “…Parallel power loads anomalies are processed by a fast-density peak clustering technique that capitalizes on the hybrid strengths of Canopy and K-means algorithms all within Apache Mahout's distributed machine-learning environment. …”
    Article
  3. 3
  4. 4
  5. 5

    Implementation of Parallel K-Means Algorithm to Estimate Adhesion Failure in Warm Mix Asphalt by Akhtar, M.N., Ahmed, W., Kakar, M.R., Bakar, E.A., Othman, A.R., Bueno, M.

    Published 2020
    “…The results showed that the PKIP algorithm decreases the execution time up to 30 to 46 if compared with the sequential k means algorithm when implemented using multiprocessing and distributed computing. …”
    Get full text
    Get full text
    Article
  6. 6

    Restoration planning strategy of transmission system based on optimal energizing time of sectionalizing islands / Dian Najihah Abu Talib by Dian Najihah , Abu Talib

    Published 2019
    “…There are two discrete optimization techniques used in this work, which are the Artificial Bee Colony algorithm and Evolutionary Programming. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer by Iqbal Basheer, Muhammmad Yunus

    Published 2023
    “…It is because the parallel mechanism is able to handle high-speed streaming data. …”
    Get full text
    Get full text
    Thesis
  8. 8

    A novel large-bit-size architecture and microarchitecture for the implementation of Superscalar Pipeline VLIW microprocessors by Lee, Weng Fook

    Published 2008
    “…Different adder architectures are investigated for suitability on synthesis implementation of large data bus size adder for efficient usage within the ALU. An adder algorithm using repetitive constructs in a parallel algorithm that allows for efficient and optimal synthesis for large data bus size is proposed as a suitable implementation for the adder within the ALU. …”
    Get full text
    Thesis
  9. 9
  10. 10

    Optimization of Workload Allocation Problem in a Network of Heterogeneous Computer Systems by Rahela, Abdul Rahim

    Published 2005
    “…A new algorithm of workload allocation scheme using First Come First Serve discipline in conjunction with optimization of GE queueing systems is proposed for minimizing mean queue length and mean response time in a network of computer systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    A 'snowflake' geometrical representation for optimised degree six 3-modified chordal ring networks by Chien, Stephen Lim Een, Raja Maamor Shah, Raja Noor Farah Azura, Othman, Mohamed

    Published 2016
    “…A tree visualisation was constructed based on its connectivity to enable the generation of formulae for optimal diameter and average optimal path lengths. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques by Mustafa, Ahmed Sudad

    Published 2017
    “…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Extreme air pollutant data analysis using classical and Bayesian approaches by Mohd Amin, Nor Azrita

    Published 2015
    “…MTM algorithm is an extension of MH algorithm, designed to improve the convergence of MH algorithm by performing parallel computation. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Investigation of QAM based on mean square error (MSE) channel estimation (CE) for MIMO-OFDM pilot based system / Mohd Ariff Ibrahim by Ibrahim, Mohd Ariff

    Published 2013
    “…The Least Square Error (LSE) and Discrete Fourier Transform (DFT) BER are not shown because these are other CE techniques and Mean Square Error (MSE) is used just by applying the algorithm from Least Square Error (LSE) and converted into MSE with combination of few complex matrix correlations.…”
    Get full text
    Get full text
    Thesis
  15. 15

    Generic DNA encoding design scheme to solve combinatorial problems by Rofilde, Hasudungan

    Published 2015
    “…The complexity of combinatorial problems is classified as NP meaning that algorithms are yet to exist to efficiently solve the problem. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Communication and computation rate-cheating problems in divisible load scheduling: revisited by Ghanbari, Shamsollah, Othman, Mohamed, Sembiyev, Ordabay, Umarova, Zhanat

    Published 2015
    “…In the real applications, the processors may cheat the algorithm which means that the processors might not report their true computation or communication rates. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    An adaptive controller of hydro generators for smart grid application in Malaysia by Mohamad, H., Bakar, A.H.A., Ping, H.W., Mokhlis, Hazlie

    Published 2010
    “…The controller has been modeled considering the existing Malaysia' distribution network of mini hydro power plant connected in parallel to the grid. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19

    3d Morphing And Shape Transformation Using Slices by Yasmin, Shamima

    Published 2009
    “…Most of the existing shape transformation algorithms involve a lot of user intervention, do not scale well when the number of input objects is more than two and are not scalable in parallel and distributed computing environment whenever needed. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
    Get full text
    Get full text
    Thesis