Search Results - (( parallel optimization path algorithm ) OR ( protocol directed learning algorithm ))*

  • Showing 1 - 17 results of 17
Refine Results
  1. 1

    Tool path generation of contour parallel based on ant colony optimisation by Abdullah, Haslina, Ramli, Rizauddin, Abd Wahab, Dzuraidah, Abu Qudeiri, Jaber

    Published 2016
    “…An Ant Colony Optimisation (ACO) method is used to optimize the tool path length because of its capability to find the shortest tool path length. …”
    Get full text
    Get full text
    Article
  2. 2
  3. 3
  4. 4

    Restoration planning strategy of transmission system based on optimal energizing time of sectionalizing islands / Dian Najihah Abu Talib by Dian Najihah , Abu Talib

    Published 2019
    “…There are two discrete optimization techniques used in this work, which are the Artificial Bee Colony algorithm and Evolutionary Programming. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    A novel large-bit-size architecture and microarchitecture for the implementation of Superscalar Pipeline VLIW microprocessors by Lee, Weng Fook

    Published 2008
    “…Different adder architectures are investigated for suitability on synthesis implementation of large data bus size adder for efficient usage within the ALU. An adder algorithm using repetitive constructs in a parallel algorithm that allows for efficient and optimal synthesis for large data bus size is proposed as a suitable implementation for the adder within the ALU. …”
    Get full text
    Thesis
  6. 6

    Spatio-temporal event association using reward-modulated spike-time-dependent plasticity by Yusoff, Nooraini, Ibrahim, Mohammed Fadhil

    Published 2018
    “…For goal-directed learning in spiking neural networks, target spike templates are usually required.Optimal performance is achieved by minimising the error between the desired and output spike timings.However, in some dynamic environments, a set of learning targets with precise encoding is not always available.For this study, we associate a pair of spatio-temporal events with a target response using a reinforcement learning approach.The learning is implemented in a recurrent spiking neural network using reward-modulated spike-time-dependent plasticity.The learning protocol is simple and inspired by a behavioural experiment from a neuropsychology study.For a goal-directed application, learning does not require a target spike template.In this study, convergence is measured by synchronicity of activities in associated neuronal groups.As a result of learning, a network is able to associate a pair of events with a temporal delay in a dynamic setting. …”
    Get full text
    Get full text
    Article
  7. 7

    Distributed denial of service attack in HTTP/2: review on security issues and future challenges by Liang Ming, Leau, Yu-Beng, Ying Xie

    Published 2024
    “…Additionally, it highlights the potential applicability of deep learning algorithms in the context of the HTTP/2 protocol. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques by Farhan, Farhan Abdel-Fattah Ahmad

    Published 2011
    “…In machine learning algorithm, choosing the most relevant features for each attack is a very important requirement, especially in mobile ad hoc networks where the network topology dynamically changes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    A 'snowflake' geometrical representation for optimised degree six 3-modified chordal ring networks by Chien, Stephen Lim Een, Raja Maamor Shah, Raja Noor Farah Azura, Othman, Mohamed

    Published 2016
    “…A tree visualisation was constructed based on its connectivity to enable the generation of formulae for optimal diameter and average optimal path lengths. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques by Mustafa, Ahmed Sudad

    Published 2017
    “…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    A review of deep learning-based defect detection and panel localization for photovoltaic panel surveillance system by Mohamed Ameerdin, Muhammad Irshat, Jamaluddin, Muhammad Herman, Shukor, Ahmad Zaki, Mohamad, Syazwani

    Published 2024
    “…This review introduces an integrated deep learning framework that leverages Convolutional Neural Networks (CNNs), Recurrent Neural Networks (RNNs), and You Only Look Once (YOLO) algorithms to enhance defect detection in solar panels. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Energy efficient cluster head distribution in wireless sensor networks by Siew, Zhan Wei

    Published 2013
    “…PSO is lightweight heuristic optimization algorithm with each CH will move towards the best solutions by individual interaction with one another while learning from their own experience. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Online teleoperation of writing manipulator through graphics processing unit based accelerated stereo vision by Abu Raid, Fadi Imad Osman

    Published 2021
    “…These algorithms are then parallelized using Compute Unified Device Architecture CUDA C language to run on Graphics Processing Unit GPU for hardware acceleration. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Comparative evaluation of anomaly-based controller area network IDS by Sharmin, Shaila, Mansor, Hafizah, Abdul Kadir, Andi Fitriah, Abdul Aziz, Normaziah

    Published 2023
    “…This work contributes to these efforts by reporting results of the comparative evaluation of four statistical and two machine learning-based CAN intrusion detection algorithm, against the Real ORNL Automotive Dynamometer (ROAD) CAN intrusion dataset. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  15. 15

    DC-based PV-powered home energy system by Sabry, Ahmad H.

    Published 2017
    “…A controller based on an algorithm of one time maximum power point (MPP) is proposed to mitigate those losses. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Advancements in battery technologies and management systems for electric vehicles A mini-review by Shanmuganathan, Elengespwaran, Norazlianie, Sazali, Kettner, Maurice, Salim, Naqib, Ismayuzri, Ishak

    Published 2025
    “…Additionally, the role of simulation tools such as Simulink in evaluating various charging methodologies is discussed, highlighting their significance in optimizing charging protocols. The review also examines developments in direct current (DC) fast charging infrastructure, including technologies such as Tesla’s Superchargers and AVL’s advanced charging solutions, which aim to provide rapid and efficient charging while addressing thermal and electrochemical challenges. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…To process large-scale data sequences, it is important to choose a suitable learning algorithm that is capable to learn in real time. …”
    Get full text
    Get full text
    Thesis