Search Results - (( parallel optimization path algorithm ) OR ( rule extraction sensor algorithm ))

  • Showing 1 - 15 results of 15
Refine Results
  1. 1

    Tool path generation of contour parallel based on ant colony optimisation by Abdullah, Haslina, Ramli, Rizauddin, Abd Wahab, Dzuraidah, Abu Qudeiri, Jaber

    Published 2016
    “…An Ant Colony Optimisation (ACO) method is used to optimize the tool path length because of its capability to find the shortest tool path length. …”
    Get full text
    Get full text
    Article
  2. 2
  3. 3
  4. 4

    Abnormal Pattern Detection In Ppg Signals Using Time Series Analysis by Siti Nur Hidayah, Mazelan

    Published 2022
    “…This project’s objectives are to implement rule-based algorithm method for abnormal pattern detection in PPG signals, and to investigate the accuracy and performance of rule-based algorithm in detecting the abnormal pattern. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  5. 5

    Restoration planning strategy of transmission system based on optimal energizing time of sectionalizing islands / Dian Najihah Abu Talib by Dian Najihah , Abu Talib

    Published 2019
    “…There are two discrete optimization techniques used in this work, which are the Artificial Bee Colony algorithm and Evolutionary Programming. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    To study on the effect of tuning rules used on the water level controllability by Ismail, Arif Iskandar

    Published 2017
    “…Time is observed by several tuning methods which are Ziegler-Nichol’s tuning rule, tuning rule by Takahashi and tuning rule by Chien, Hrones and Reswick (CHR). …”
    Get full text
    Get full text
    Student Project
  7. 7

    To study on the effect of tuning rules used on the water level controllability: article by Ismail, Arif Iskandar, Ishak, Abdul Aziz

    Published 2017
    “…Time is observed by several tuning methods which are Ziegler-Nichol’s tuning rule, tuning rule by Takahashi and tuning rule by Chien, Hrones and Reswick (CHR). …”
    Get full text
    Get full text
    Article
  8. 8

    A novel large-bit-size architecture and microarchitecture for the implementation of Superscalar Pipeline VLIW microprocessors by Lee, Weng Fook

    Published 2008
    “…Different adder architectures are investigated for suitability on synthesis implementation of large data bus size adder for efficient usage within the ALU. An adder algorithm using repetitive constructs in a parallel algorithm that allows for efficient and optimal synthesis for large data bus size is proposed as a suitable implementation for the adder within the ALU. …”
    Get full text
    Thesis
  9. 9

    A 'snowflake' geometrical representation for optimised degree six 3-modified chordal ring networks by Chien, Stephen Lim Een, Raja Maamor Shah, Raja Noor Farah Azura, Othman, Mohamed

    Published 2016
    “…A tree visualisation was constructed based on its connectivity to enable the generation of formulae for optimal diameter and average optimal path lengths. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques by Mustafa, Ahmed Sudad

    Published 2017
    “…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    A Hybrid Thermal-Visible Fusion for Outdoor Human Detection by Ezrinda, Mohd Zahidee, Kamarul Hawari, Ghazali, Ren, Jinchang, Mohd Zuki, Salleh

    Published 2018
    “…A hybrid thermal-visible image fusion is proposed in this paper to detect the target and produce an output image that had all the information from both sensors. The thermal target region was extracted using Niblack algorithm and some morphological operators. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    An efficient trust-based decision-making approach for WSNs: Machine learning oriented approach by Khan, T., Singh, K., Shariq, M., Ahmad, K., Savita, K.S., Ahmadian, A., Salahshour, S., Conti, M.

    Published 2023
    “…The proposed machine learning algorithm extracts various trust features such as Co-Location Relationship (CLR), Co-Work Relationship (CWR), Cooperativeness-Frequency-Duration (CFD), and Reward (R) to obtain a robust trust rating of sensor devices and predict future misbehavior. …”
    Get full text
    Get full text
    Article
  13. 13

    A Hybrid Thermal-visible Fusion for Outdoor Human Detection by Ezrinda, Mohd Zaihidee, Kamarul Hawari, Ghazali, Ren, Jinchang, Mohd Zuki, Salleh

    Published 2017
    “…A hybrid thermal-visible image fusion is proposed in this paper to detect the target and produce an output image that had all the information from both sensors. The thermal target region was extracted using Niblack algorithm and some morphological operators. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Online teleoperation of writing manipulator through graphics processing unit based accelerated stereo vision by Abu Raid, Fadi Imad Osman

    Published 2021
    “…These algorithms are then parallelized using Compute Unified Device Architecture CUDA C language to run on Graphics Processing Unit GPU for hardware acceleration. …”
    Get full text
    Get full text
    Thesis
  15. 15

    DC-based PV-powered home energy system by Sabry, Ahmad H.

    Published 2017
    “…A controller based on an algorithm of one time maximum power point (MPP) is proposed to mitigate those losses. …”
    Get full text
    Get full text
    Thesis