Search Results - (( parallel optimization path algorithm ) OR ( property distribution based algorithm ))

Refine Results
  1. 1

    A 'snowflake' geometrical representation for optimised degree six 3-modified chordal ring networks by Chien, Stephen Lim Een, Raja Maamor Shah, Raja Noor Farah Azura, Othman, Mohamed

    Published 2016
    “…A tree visualisation was constructed based on its connectivity to enable the generation of formulae for optimal diameter and average optimal path lengths. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Tool path generation of contour parallel based on ant colony optimisation by Abdullah, Haslina, Ramli, Rizauddin, Abd Wahab, Dzuraidah, Abu Qudeiri, Jaber

    Published 2016
    “…An Ant Colony Optimisation (ACO) method is used to optimize the tool path length because of its capability to find the shortest tool path length. …”
    Get full text
    Get full text
    Article
  3. 3
  4. 4
  5. 5

    Restoration planning strategy of transmission system based on optimal energizing time of sectionalizing islands / Dian Najihah Abu Talib by Dian Najihah , Abu Talib

    Published 2019
    “…There are two discrete optimization techniques used in this work, which are the Artificial Bee Colony algorithm and Evolutionary Programming. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    The implementation of forward chaining algorithm in calculating inheritance property based on faraid law / Nur Ain Syafiqah Mohammad Marzuki by Mohammad Marzuki, Nur Ain Syafiqah

    Published 2021
    “…Therefore, the purpose of this study is to facilitate the use of Forward Chaining Algorithm to calculate Faraid based on inheritance division. …”
    Get full text
    Get full text
    Student Project
  7. 7

    A novel large-bit-size architecture and microarchitecture for the implementation of Superscalar Pipeline VLIW microprocessors by Lee, Weng Fook

    Published 2008
    “…Different adder architectures are investigated for suitability on synthesis implementation of large data bus size adder for efficient usage within the ALU. An adder algorithm using repetitive constructs in a parallel algorithm that allows for efficient and optimal synthesis for large data bus size is proposed as a suitable implementation for the adder within the ALU. …”
    Get full text
    Thesis
  8. 8

    A novel scheduling algorithm based on game theory and multicriteria decision making in LTE network by Hindia, M.N., Reza, A.W., Noordin, K.A.

    Published 2015
    “…However, 3GPP is not a standardized scheduling algorithm to utilize LTE properties in smart grid applications. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques by Mustafa, Ahmed Sudad

    Published 2017
    “…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Estimation Of Weibull Parameters Using Simulated Annealing As Applied In Financial Data by Hamza, Abubakar

    Published 2023
    “…The finding reveals that the Weibull distribution is well-suited to describing the investment behaviour of the MPS based on the estimates via the SA algorithm. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Inelastic analysis of composite sections by Thanoon, Waleed Abdulmalik, M. Hamed, Ahmed M., Noorzaei, Jamaloddin, Jaafar, Mohd Saleh, Al-Silayvani, Bayar J.

    Published 2004
    “…The algorithm is based on finding the strain distribution across the section for a given applied loads and mechanical properties of the materials. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    A Novel Approach Of Groebner Bases Computation For Safety Analysis Of Distributed Discrete Controllers by Alwi @ Suhaimi, Saifulza, Salleh, Mohd Rizal, Jaafar, Hazriq Izzuan, Ab Ghani, Mohd Ruddin, Md Fauadi, Muhammad Hafidz Fazli

    Published 2019
    “…One of the favorite topic is the formal verification via model checking, which is to verify whether a mathematical model of a system meets the formal specification that describes the property to be checked. In this research, our main objective is to generate a new model checking computation method based on Groebner bases algorithm for safety property analysis of distributed discrete controllers. …”
    Get full text
    Get full text
    Get full text
    Technical Report
  14. 14

    Beta Distribution Weighted Fuzzy C-Ordered-Means Clustering by Hengda, Wang, Mohamad Mohsin, Mohamad Farhan, Mohd Pozi, Muhammad Syafiq

    Published 2024
    “…The BDFCOM algorithm utilises the properties of the Beta distribution to weight sample features, thus not only circumventing the time cost problem of the traditional ordered mechanism but also reducing the influence of noise. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16
  17. 17

    A new Gompertz-three-parameter-lindley distribution for modeling survival time data by Liang, Fei, Lu, Hezhi, Xi, Yuhang

    Published 2025
    “…Moreover, a new regression model based on the proposed distribution is presented. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation by Abu, Ahmad Zaidee

    Published 2008
    “…This thesis work studied on digital image encryption algorithms performed towards JPEG images. With image encryption algorithms, JPEG images can be securely scrambled or encrypted prior to distribution. …”
    Get full text
    Get full text
    Thesis
  19. 19

    A novel quasi-oppositional modified Jaya algorithm for multi-objective optimal power flow solution by Warid, Warid, Hizam, Hashim, Mariun, Norman, Abdul Wahab, Noor Izzri

    Published 2018
    “…An intelligence strategy called quasi-oppositional based learning is incorporated into the proposed algorithm to enhance its convergence property, exploration capability, and solution optimality. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Semiparametric inference procedure for the accelarated failure time model with interval-censored data by Karimi, Mostafa

    Published 2019
    “…The rank-based methods, estimating algorithms, and resampling techniques that are developed do not involve the difficulties of the existing estimating procedures. …”
    Get full text
    Get full text
    Get full text
    Thesis