Search Results - (( parameter evaluation method algorithm ) OR ( global distributions process algorithm ))
Search alternatives:
- distributions process »
- parameter evaluation »
- global distributions »
- evaluation method »
- process algorithm »
- method algorithm »
-
1
Nomadic people optimizer (NPO) for large-scale optimization problems
Published 2019“…Three major problems are encountered when designing metaheuristics; the first problem is balancing exploration with exploitation capabilities (which leads to premature convergence or trapping in the local minima), while the second problem is the dependency of the algorithm on the controlling parameters, which are parameters with unknown optimal values. …”
Get full text
Get full text
Thesis -
2
-
3
SWAT and ANN model hydrological assessment using Malaysia soil data / Khairi Khalid
Published 2017“…The research aims to evaluate the performance and hydrological response of the Soil Water Assessment Tool (SWAT) process-based model in tropical river basin using Malaysia soil data. …”
Get full text
Get full text
Thesis -
4
Clock Distribution Network Building Algorithm For Multiple Ips In System On A Chip
Published 2017“…In this project, an algorithm is proposed and developed to build the global CDN that is used to distribute the clocks to all partitions in the SoC using the channels available between partitions. …”
Get full text
Get full text
Thesis -
5
Parameter extraction of photovoltaic module using hybrid evolutionary algorithm
Published 2023Conference Paper -
6
Static and self-scalable filter range selection algorithms for peer-to-peer networks
Published 2011“…The range will be adjusted and becomes narrower while ensuring the target keys are still within it as the process iterates until the keys have been found. The selfscalable selection algorithm uses dynamic range where the filter range is not preset and is determined by the algorithm itself based on the distribution and the values of the data in the global and local file. …”
Get full text
Get full text
Thesis -
7
Taguchi-Grey Relational Analysis Method for Parameter Tuning of Multi-objective Pareto Ant Colony System Algorithm
Published 2023“…The gray relational grade (GRG) performance metric and the Friedman test were used to evaluate the algorithm’s performance. The Taguchi-GRA method that produced the new values for the algorithm’s parameters was shown to be able to provide a better multi-objective generator maintenance scheduling (GMS) solution. …”
Get full text
Get full text
Get full text
Article -
8
Evaluation of lightning current parameters using measured lightning induced voltage on distribution power lines
Published 2019“…In this paper, an algorithm had been proposed to evaluate the lightning current parameters using measured voltage from overhead distribution lines based on lightning location obtained from lightning location system. …”
Get full text
Get full text
Conference or Workshop Item -
9
Statistical fixed range multiple selection algorithm for peer-to-peer system
Published 2010“…A global file with n keys is distributed evenly among p peers in the peer-to-peer network. …”
Get full text
Get full text
Conference or Workshop Item -
10
Inversed Control Parameter in Whale Optimization Algorithm and Grey Wolf Optimizer for Wrapper-Based Feature Selection: A Comparative Study
Published 2023“…This comparative study aims to investigate and compare the effectiveness of the inversed control parameter in the proposed methods against the original algorithms in terms of the number of selected features and the classification accuracy. …”
Get full text
Get full text
Article -
11
Inversed Control Parameter in Whale Optimization Algorithm and Grey Wolf Optimizer for Wrapper-Based Feature Selection: A Comparative Study
Published 2023“…This comparative study aims to investigate and compare the effectiveness of the inversed control parameter in the proposed methods against the original algorithms in terms of the number of selected features and the classification accuracy. …”
Get full text
Get full text
Article -
12
Evaluation of Lightning Current Using Inverse Procedure Algorithm.
Published 2013“…The proposed method considers on all electromagnetic fields components and can evaluate full shape of current, velocity and constant parameters of current models in contrast with previous studies. …”
Get full text
Get full text
Article -
13
A non-blocking coordinated checkpointing algorithm for message-passing systems
Published 2015“…The processes synchronize their checkpointing activities so that a globally consistent set of checkpoints is always maintained in the system. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
Static range multiple selection algorithm for peer-to-peer system
Published 2011“…A global file with n keys is distributed evenly among n peers in the peer-to-peer network. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Deriving global and local integrity rules for a distributed database
Published 2001“…Our technique referred to as the integrity test generation, derives global and local integrity rules has effectively reduced the cost of constraint checking in a distributed environment.…”
Get full text
Get full text
Get full text
Article -
16
Tree-based contrast subspace mining method
Published 2020“…Then, the tree-based method, the genetic algorithm based parameter values identification of tree-based method, and followed by the genetic algorithm based tree-based method, for numerical data sets are developed and evaluated. …”
Get full text
Get full text
Get full text
Thesis -
17
Evaluation of lightning current parameters using measured lightning induced voltage on distribution power lines
Published 2023Conference Paper -
18
Evaluating power efficient algorithms for efficiency and carbon emissions in cloud data centers: a review
Published 2015“…The three algorithms are evaluated for performance using three parameters; power efficiency, cost effectiveness, and amount of CO2 emissions. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
19
Performance evaluation of symmetric cryptography algorithm for database system / Mariam Azwa Yazid
Published 2015“…Cryptography has been proven to be the best method to secure a database. However there are many types of cryptography algorithm that has been established in the market. …”
Get full text
Get full text
Thesis -
20
Distance vector-hop range-free location algorithm for wireless sensor network
Published 2015“…This has caused the tasks for each sensor node to be permanently fixed, thus causing the overall process of the localization algorithm to be complex. …”
Get full text
Get full text
Thesis
