Search Results - (( parallel optimization path algorithm ) OR ( regional distribution issues algorithm ))
Search alternatives:
- parallel optimization »
- regional distribution »
- distribution issues »
- optimization path »
- issues algorithm »
- path algorithm »
-
1
Tool path generation of contour parallel based on ant colony optimisation
Published 2016“…An Ant Colony Optimisation (ACO) method is used to optimize the tool path length because of its capability to find the shortest tool path length. …”
Get full text
Get full text
Article -
2
Minimizing machining airtime motion with an ant colony algorithm
Published 2016Get full text
Get full text
Article -
3
-
4
Restoration planning strategy of transmission system based on optimal energizing time of sectionalizing islands / Dian Najihah Abu Talib
Published 2019“…There are two discrete optimization techniques used in this work, which are the Artificial Bee Colony algorithm and Evolutionary Programming. …”
Get full text
Get full text
Get full text
Thesis -
5
A novel large-bit-size architecture and microarchitecture for the implementation of Superscalar Pipeline VLIW microprocessors
Published 2008“…Different adder architectures are investigated for suitability on synthesis implementation of large data bus size adder for efficient usage within the ALU. An adder algorithm using repetitive constructs in a parallel algorithm that allows for efficient and optimal synthesis for large data bus size is proposed as a suitable implementation for the adder within the ALU. …”
Get full text
Thesis -
6
-
7
Clustering of Indonesian forest fires using self organizing maps
Published 2006Get full text
Get full text
Get full text
Article -
8
A 'snowflake' geometrical representation for optimised degree six 3-modified chordal ring networks
Published 2016“…A tree visualisation was constructed based on its connectivity to enable the generation of formulae for optimal diameter and average optimal path lengths. …”
Get full text
Get full text
Conference or Workshop Item -
9
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
Get full text
Get full text
Get full text
Thesis -
10
An attack proof intelligent digital watermarking based on safe region of fast fourier transform
Published 2010“…Keywords: (Artificial Neural Network, Back Propagation algorithm, Fast Fourier Transform, FFT, Image watermarking, Safe Region,) …”
Get full text
Get full text
Get full text
Proceeding Paper -
11
Electrical Capacitance Tomography Design And Analysis For Bubble Flow Regime
Published 2010“…Tomography system is a process to determine the distribution of materials in some region of interest by obtaining a set of measurements using sensors that are distributed around the periphery. …”
Get full text
Get full text
Final Year Project -
12
Detection of leak size and its location in a water distribution system by using K-NN / Nasereddin Ibrahim Sherksi
Published 2020“…All water distribution networks suffer from leaks and the amount of leakage widely varies between countries and regions within a country. …”
Get full text
Get full text
Thesis -
13
-
14
MCRP: multiple chain routing protocol for energy efficiency in homogeneous wireless sensor networks
Published 2019Get full text
Get full text
Conference or Workshop Item -
15
Online teleoperation of writing manipulator through graphics processing unit based accelerated stereo vision
Published 2021“…These algorithms are then parallelized using Compute Unified Device Architecture CUDA C language to run on Graphics Processing Unit GPU for hardware acceleration. …”
Get full text
Get full text
Thesis -
16
Model-based hybrid variational level set method applied to object detection in grey scale images
Published 2024“…These operators dynamically determine the optimal number of layers and precise scale parameters, overcoming issues with local minima and enabling successful handling of severely uneven grayscale distributions. …”
Get full text
Get full text
Thesis -
17
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…The proposed model has distributed and cooperative hierarchical architecture, where nodes communicate with their region gateway node to make decisions. …”
Get full text
Get full text
Get full text
Thesis -
18
An adaptive data replication and placement for efficient data storage of online social networks using two-tier multi-cloud environment
Published 2022“…Using multiple CSPs to replicate and distribute the data object is a solution to such obstacles. …”
Get full text
Get full text
Article -
19
Online dynamic replication and placement algorithms for cost optimization of online social networks in two-tier multi-cloud
Published 2024“…A simulation using a synthesized workload generated based on a real Facebook statistic dataset shows that the proposed algorithms produce a monetary cost savings of more than 23 compared to the Static Replication and Local Placement (SRLP) algorithm.…”
Get full text
Get full text
Get full text
Article -
20
Acltshe-Amts: A New Adaptive Brain Tumour Enhancement And Segmentation Approaches
Published 2024“…The AMTS approach segments and extracts the whole tumor, core tumor, and enhanced tumor regions from the brain MR images, integrating the Multi-Objective Grasshopper Optimization algorithm, Kapur Entropy, Cross-Entropy, and Localized active contour.…”
Get full text
Get full text
Thesis
