Search Results - (( parallel optimization path algorithm ) OR ( protocol distributed normal algorithm ))

  • Showing 1 - 18 results of 18
Refine Results
  1. 1

    Tool path generation of contour parallel based on ant colony optimisation by Abdullah, Haslina, Ramli, Rizauddin, Abd Wahab, Dzuraidah, Abu Qudeiri, Jaber

    Published 2016
    “…An Ant Colony Optimisation (ACO) method is used to optimize the tool path length because of its capability to find the shortest tool path length. …”
    Get full text
    Get full text
    Article
  2. 2
  3. 3
  4. 4

    Restoration planning strategy of transmission system based on optimal energizing time of sectionalizing islands / Dian Najihah Abu Talib by Dian Najihah , Abu Talib

    Published 2019
    “…There are two discrete optimization techniques used in this work, which are the Artificial Bee Colony algorithm and Evolutionary Programming. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    An enhanced cluster head selection algorithm for routing in mobile AD-HOC network by Abdulsaheb, Ghaida Muttasher

    Published 2017
    “…This thesis proposes a cluster based routing protocol, the Enhanced Cluster Routing Protocol (ECRP), which uses a modified cluster formation algorithm to build the cluster structure and select one of the nodes to be the cluster head. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Soap performance enhancement for high volume messaging / Ali Baba Dauda by Ali Baba , Dauda

    Published 2018
    “…The client invokes the server to establish WSDL contract and communicate via the relevant protocol. Two messages formats, normal and compressed (modified algorithm) with the size ranging 1MB - 22 MB were generated and executed 50 times in both web services. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    A novel large-bit-size architecture and microarchitecture for the implementation of Superscalar Pipeline VLIW microprocessors by Lee, Weng Fook

    Published 2008
    “…Different adder architectures are investigated for suitability on synthesis implementation of large data bus size adder for efficient usage within the ALU. An adder algorithm using repetitive constructs in a parallel algorithm that allows for efficient and optimal synthesis for large data bus size is proposed as a suitable implementation for the adder within the ALU. …”
    Get full text
    Thesis
  9. 9

    ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs by Khan, T., Singh, K., Hasan, M.H., Ahmad, K., Reddy, G.T., Mohan, S., Ahmadian, A.

    Published 2021
    “…ETERS utilizes the Beta distribution-based trust function because recovery of trust values under attacks is faster in Beta distribution than Gaussian and Dirichlet distribution. …”
    Get full text
    Get full text
    Article
  10. 10

    Evaluation of Clustering and Multi-hop Routing Protocols in Mobile Ad-hoc Sensor Networks by Jambli, M.N., Hendrick, A., Julaihi, A.A., Abdullah, J., Suhaili, S.M.

    Published 2015
    “…A HEED (Hybrid, Energy-Efficient, Distributed) is one of the clustering algorithm for sensor networks. …”
    Get full text
    Get full text
    Proceeding
  11. 11

    A 'snowflake' geometrical representation for optimised degree six 3-modified chordal ring networks by Chien, Stephen Lim Een, Raja Maamor Shah, Raja Noor Farah Azura, Othman, Mohamed

    Published 2016
    “…A tree visualisation was constructed based on its connectivity to enable the generation of formulae for optimal diameter and average optimal path lengths. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques by Mustafa, Ahmed Sudad

    Published 2017
    “…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Dose verification procedures in radiotherapy by Zakaria, Ahmad, Idris, Nik Rusman Nik

    Published 1999
    “…Our results showed that the algorithms (pencil beam) in the planning computer gave acceptable accuracy for our test cases. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Software reusability in green computing / Ibraheem Y. Y. Ahmaro by Y. Y. Ahmaro, Ibraheem

    Published 2013
    “…Telecommuting is the main green computing approach while algorithmic efficiency, power management, voice over internet protocol (VOIP) and virtualization approaches are also commonly used methods. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Online teleoperation of writing manipulator through graphics processing unit based accelerated stereo vision by Abu Raid, Fadi Imad Osman

    Published 2021
    “…These algorithms are then parallelized using Compute Unified Device Architecture CUDA C language to run on Graphics Processing Unit GPU for hardware acceleration. …”
    Get full text
    Get full text
    Thesis
  17. 17

    DC-based PV-powered home energy system by Sabry, Ahmad H.

    Published 2017
    “…A controller based on an algorithm of one time maximum power point (MPP) is proposed to mitigate those losses. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…In Chapter 4, we propose a fast Distributed Denial of Service (DDoS) backscat�ter detection system to detect DDoS backscatter from a combination of protocols and ports other than the following two labeled packets: Transmission Control Protocol (TCP) Port 80 (80/TCP) and User datagram Protocol (UDP) Port 53 (53/UDP). …”
    Get full text
    Get full text
    Thesis