Search Results - (( parallel evaluation new algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    Parallel algorithms for numerical simulations of EHD ion-drag micropump on distributed parallel computing systems by Shakeel Ahmed, Kamboh

    Published 2014
    “…To implement the parallel algorithms a distributed parallel computing laboratory using easily available low cost computers is setup. …”
    Get full text
    Get full text
    Thesis
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    PMT : opposition based learning technique for enhancing metaheuristic algorithms performance by Hammoudeh, S. Alamri

    Published 2020
    “…Addressing these OBL limitations, this research proposes a new general OBL technique inspired by a natural phenomenon of parallel mirrors systems called the Parallel Mirrors Technique (PMT). …”
    Get full text
    Get full text
    Thesis
  4. 4

    PMT: opposition-based learning technique for enhancing meta-heuristic performance by Alamri, Hammoudeh S., Kamal Z., Zamli

    Published 2019
    “…Addressing these issues, this research proposes a new general opposition-based learning (OBL) technique inspired by a natural phenomenon of parallel mirrors systems called the parallel mirrors technique (PMT). …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Topology-aware hypergraph based approach to optimize scheduling of parallel applications onto distributed parallel architectures by Koohi, Sina Zangbari

    Published 2020
    “…To achieve an optimum waiting and response time this thesis has proposed a new approach utilizing the aforementioned modelling, optimizing and partitioning algorithms. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  7. 7

    Synchronous gravitational search algorithm vs asynchronous gravitational search algorithm: a statistical analysis by Abd Aziz, N.A., Ibrahim, Z., Nawawi, S.W., Sudin, S., Mubin, M., Abd Aziz, K.

    Published 2014
    “…Gravitational search algorithm (GSA) is a new member of swarm intelligence algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Efficient 3D temperature propagation for laser glass interaction by Alias, Norma, Shahril, Rosdiana, Islam, Md. Rajibul, Satam, Noriza, Darwis, Roziha

    Published 2008
    “…The performance evaluations of the algorithm are increasing in terms of speed-up, efficiency and effectiveness.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    A Community-Based Fault Isolation Approach for Effective Simultaneous Localization of Faults by Zakari, Abubakar, Lee, Sai Peck, Targio Hashem, Ibrahim Abaker

    Published 2019
    “…This paper proposes a new approach that makes use of a divisive network community clustering algorithm to isolate faults into separate fault-focused communities that target a single fault each. …”
    Get full text
    Get full text
    Article
  10. 10

    Speech compression using compressive sensing on a multicore system by Gunawan, Teddy Surya, Khalifa, Othman Omran, Shafie, Amir Akramin, Ambikairajah, Eliathamby

    Published 2011
    “…The performance of overall algorithms will be evaluated based on the processing time and speech quality. …”
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    Performance Evaluation Of Combined Code-Space Division Multiple Access With Enhanced Parallel Interference Cancellation by Odeh, Nidhal A.S.

    Published 2007
    “…Finally, the probability of blocking was evaluated in terms of various numbers of available codes. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  14. 14

    Computationally efficient sequential learning algorithms for direct link resource-allocating networks by Asirvadam , Vijanth Sagayan, McLoone, Sean, Irwin, George W

    Published 2005
    “…The new algorithms, which also incorporate a pruning strategy to control network growth, are evaluated on three different system identification benchmark problems and shown to outperform existing methods both in terms of training error convergence and computational efficiency.…”
    Get full text
    Get full text
    Article
  15. 15

    Solving ordinary differential equations using block multistep method by Mehrkanoon, Siamak

    Published 2011
    “…Both sequential and parallel algorithms were carried out on Sunfire V1280 with eight homogeneous processors located at Institute of Mathematical Research (INSPEM), University Putra Malaysia. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19
  20. 20

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
    Get full text
    Get full text
    Student Project