Search Results - (( parallel optimization path algorithm ) OR ( probable distribution control algorithm ))
Search alternatives:
- parallel optimization »
- probable distribution »
- distribution control »
- optimization path »
- path algorithm »
-
1
Tool path generation of contour parallel based on ant colony optimisation
Published 2016“…An Ant Colony Optimisation (ACO) method is used to optimize the tool path length because of its capability to find the shortest tool path length. …”
Get full text
Get full text
Article -
2
Minimizing machining airtime motion with an ant colony algorithm
Published 2016Get full text
Get full text
Article -
3
-
4
Restoration planning strategy of transmission system based on optimal energizing time of sectionalizing islands / Dian Najihah Abu Talib
Published 2019“…There are two discrete optimization techniques used in this work, which are the Artificial Bee Colony algorithm and Evolutionary Programming. …”
Get full text
Get full text
Get full text
Thesis -
5
Estimation of Transformers Health Index Based on Condition Parameter Factor and Hidden Markov Model
Published 2023“…Electric transformers; Health; Hidden Markov models; Nonlinear programming; Probability distributions; Quality control; Viterbi algorithm; Condition parameters; Dissolved gas analysis; Distribution transformer; Emission probabilities; Health indices; Non-linear optimization; Remaining useful lives; Transition probabilities; Parameter estimation…”
Conference Paper -
6
Evaluation of MAC's distributed queuing algorithm for Internet of things applications
Published 2017Get full text
Get full text
Get full text
Proceeding Paper -
7
Agents for Fuzzy Indices of Reliability Power System with Uncertainty Using Monte Carlo Algorithm
Published 2014“…Two agents are developed based on fuzzy parameters of Monte Carlo i.e. current with its means and variances; the other agent is the probability of outage capacity for each state. These agents shall be applied in terms of the loss of load probability (LOLP) and loss of load expectation (LOLE) which when implemented and compared based on a Malaysian distribution network (DISCO-Net). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
A novel large-bit-size architecture and microarchitecture for the implementation of Superscalar Pipeline VLIW microprocessors
Published 2008“…Different adder architectures are investigated for suitability on synthesis implementation of large data bus size adder for efficient usage within the ALU. An adder algorithm using repetitive constructs in a parallel algorithm that allows for efficient and optimal synthesis for large data bus size is proposed as a suitable implementation for the adder within the ALU. …”
Get full text
Thesis -
9
A 'snowflake' geometrical representation for optimised degree six 3-modified chordal ring networks
Published 2016“…A tree visualisation was constructed based on its connectivity to enable the generation of formulae for optimal diameter and average optimal path lengths. …”
Get full text
Get full text
Conference or Workshop Item -
10
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
Get full text
Get full text
Get full text
Thesis -
11
A new hybrid GA−ACO−PSO algorithm for solving various engineering design problems
Published 2019“…The intention of this hybridization is to further enhance the exploratory and exploitative search capabilities involving simple concepts. The proposed algorithm adopts the combined discrete and continuous probability distribution scheme of ant colony optimization (ACO) to specifically assist genetic algorithm in the aspect of exploratory search. …”
Get full text
Get full text
Article -
12
Service and Voltage Sag Study of Humid and Dry Weather Utilities
Published 2002“…The study has been focused to formulate algorithm for estimating probability of nuisance trip outs in industrial organizations operating in humid and hot dry environments. …”
Get full text
Get full text
Article -
13
Online teleoperation of writing manipulator through graphics processing unit based accelerated stereo vision
Published 2021“…These algorithms are then parallelized using Compute Unified Device Architecture CUDA C language to run on Graphics Processing Unit GPU for hardware acceleration. …”
Get full text
Get full text
Thesis -
14
Multi-objective scientific workflow scheduling algorithm in multi-cloud environment for satisfying QoS requirements
Published 2022“…With the MOS-MWO algorithm, makespan is reduced by 40%, cost also reduced by 3 % and risk probability reduced by 86%. …”
Get full text
Get full text
Thesis -
15
A review on path collisions and resources usage in hybrid optical Network on Chip (HONoC)
Published 2023Conference Paper -
16
DC-based PV-powered home energy system
Published 2017“…A controller based on an algorithm of one time maximum power point (MPP) is proposed to mitigate those losses. …”
Get full text
Get full text
Thesis -
17
Class binarization with self-adaptive algorithm to improve human activity recognition
Published 2018“…Also, self-adaptive scaling factor and crossover probability control parameters are introduced to diminish time of finding an optimal parameter to produce the best population. …”
Get full text
Get full text
Thesis -
18
Population genetic structure of Malayan Tapir (Tapirus indicus Desmarest) in Peninsular Malaysia
Published 2019“…Using K-means clustering algorithm, five clusters were inferred among the wild samples (N = 57), which showed a complex population structure probably comprising multiple continuous populations that also experiencing considerably restricted gene flow due to isolation by geographical barriers especially mountain ranges. …”
Get full text
Get full text
Thesis -
19
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…In Chapter 4, we propose a fast Distributed Denial of Service (DDoS) backscat�ter detection system to detect DDoS backscatter from a combination of protocols and ports other than the following two labeled packets: Transmission Control Protocol (TCP) Port 80 (80/TCP) and User datagram Protocol (UDP) Port 53 (53/UDP). …”
Get full text
Get full text
Thesis
