Search Results - (( parallel implementation level algorithm ) OR ( parallel optimization path algorithm ))
Search alternatives:
- parallel optimization »
- implementation level »
- optimization path »
- level algorithm »
- path algorithm »
-
1
Online teleoperation of writing manipulator through graphics processing unit based accelerated stereo vision
Published 2021“…These algorithms are then parallelized using Compute Unified Device Architecture CUDA C language to run on Graphics Processing Unit GPU for hardware acceleration. …”
Get full text
Get full text
Thesis -
2
Tool path generation of contour parallel based on ant colony optimisation
Published 2016“…An Ant Colony Optimisation (ACO) method is used to optimize the tool path length because of its capability to find the shortest tool path length. …”
Get full text
Get full text
Article -
3
Minimizing machining airtime motion with an ant colony algorithm
Published 2016Get full text
Get full text
Article -
4
Parallel Implementation of Two Level Barotropic Models Applied to the Weather Prediction Problem
Published 2004“…To process the data collected from British Atmospheric Data Centre (BADC), the sequential programs in row and columnwise fashions are developed and implemented. Then the parallel algorithms are constructed and run using the Beowulf Cluster machine. …”
Get full text
Get full text
Thesis -
5
-
6
Implementation of High Speed Large Integer Multiplication Algorithm on Contemporary Architecture
Published 2018“…We are able to eliminate the bottleneck, the CRT algorithm from our previous implementation by replacing it with another level of CTFNT and hence increased the multiplication operand size to 4096, 192K, 384K and 768K-bit.In our FPGA implementation, we focused on designing the processing unit ourselves that is capable of computing 3072-bit multiplication. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. Experimental results indicate that as the thread level increases, the encryption and decryption time, which is the most time consuming operation, decreases which shows an improved speed of the RSA cryptosystem.The proposed implementation has a great potential to effectively deal with the RSA algorithm slow speed.…”
Get full text
Get full text
Get full text
Article -
8
The AGEB algorithm for solving the heat equation in three space dimensions and its parallelization using PVM
Published 2023“…It is inherently explicit and is therefore well suited for parallel implementation on the PVM where data decomposition is run asynchronously and concurrently at every time level. …”
Conference Paper -
9
The AGEB Algorithm for Solving the Heat Equation in Three Space Dimensions and Its Parallelization Using PVM
Published 2001“…It is inherently explicit and is therefore well suited for parallel implementation on the PVM where data decomposition is run asynchronously and concurrently at every time level. …”
Get full text
Get full text
Article -
10
Parallel and Separable Recursive Levenberg- Marquardt Training Algorithm
Published 2002“…By neglecting interneuron weight correlations the recently proposed RLM training algorithm can be decomposed at neuron level enabling weights to be updated in an efficient parallel manner. …”
Get full text
Get full text
Book Section -
11
The AGEB Algorithm for Solving the Heat Equation in Three Dimensions and Its Parallelization Using PVM
Published 2001“…It is inherently explicit and is therefore well suited for parallel implementation on the PVM where data decomposition is run asynchronously and concurrently at every time level. …”
Get full text
Get full text
Get full text
Article -
12
Restoration planning strategy of transmission system based on optimal energizing time of sectionalizing islands / Dian Najihah Abu Talib
Published 2019“…There are two discrete optimization techniques used in this work, which are the Artificial Bee Colony algorithm and Evolutionary Programming. …”
Get full text
Get full text
Get full text
Thesis -
13
An embedded database design and implementation of a parallel IEEE XTS storage encryption for mobile devices
Published 2017“…To ensure higher security level, the developed system is implemented using the NIST-certified XTS-AES block encryption algorithm. …”
Get full text
Get full text
Get full text
Thesis -
14
Implementation of Parallel K-Means Algorithm to Estimate Adhesion Failure in Warm Mix Asphalt
Published 2020“…The results showed that the PKIP algorithm decreases the execution time up to 30 to 46 if compared with the sequential k means algorithm when implemented using multiprocessing and distributed computing. …”
Get full text
Get full text
Article -
15
Voting algorithms for large scale fault-tolerant systems
Published 2011“…To solve this problem and gain benefits of this algorithm, we employed parallel algorithm technique and by using optimal number of processors, we could propose optimal algorithms known as Parallel Average Voting and Parallel Weighted Average Voting which both have optimal time complexity and less calculation cost. …”
Get full text
Get full text
Thesis -
16
Design and analysis of high performance and low power matrix filling for DNA sequence allignment accelerator using ASIC design flow / Nurul Farhana Abd Razak
Published 2010“…The objective of this paper is to improve the performance of the DNA sequence alignment and to optimize power reduction of the existing technique by using Smith Waterman (SW) algorithm. The scope of study is by using the matrix filling method which is in parallel implementation of the SmithWaterman algorithm. …”
Get full text
Get full text
Student Project -
17
Parallel strategies on a distributed parallel computer system
Published 2004“…The development of a few strategies parallel is being as a mechanism for IADE to make it implemented in parallel. …”
Get full text
Get full text
Monograph -
18
Parallelizing GF (p) montgomery elliptic curve crypto-system operations to improve security and performance.
Published 2012“…The best performance level was achieved when parallelizing Montgomery ECC computations to eight parallel multipliers (PM) using homogeneous coordinates. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Parallelizing GF (p) montgomery elliptic curve crypto-system operations to improve security and performance.
Published 2013“…The best performance level was achieved when parallelizing Montgomery ECC computations to eight parallel multipliers (PM) using homogeneous coordinates. …”
Get full text
Get full text
Book Section -
20
Conjunctions in biological neural architectures for visual pose estimation / Tom´As Maul
Published 2006“…At the algorithmic level, several approaches for solving the pose estimation problem are compared in terms of their neural implementability. …”
Get full text
Get full text
Thesis
