Search Results - (( post implementation based algorithm ) OR ( parallel optimization path algorithm ))
Search alternatives:
- parallel optimization »
- implementation based »
- post implementation »
- optimization path »
- path algorithm »
-
1
Tool path generation of contour parallel based on ant colony optimisation
Published 2016“…An Ant Colony Optimisation (ACO) method is used to optimize the tool path length because of its capability to find the shortest tool path length. …”
Get full text
Get full text
Article -
2
Minimizing machining airtime motion with an ant colony algorithm
Published 2016Get full text
Get full text
Article -
3
-
4
Restoration planning strategy of transmission system based on optimal energizing time of sectionalizing islands / Dian Najihah Abu Talib
Published 2019“…There are two discrete optimization techniques used in this work, which are the Artificial Bee Colony algorithm and Evolutionary Programming. …”
Get full text
Get full text
Get full text
Thesis -
5
A novel large-bit-size architecture and microarchitecture for the implementation of Superscalar Pipeline VLIW microprocessors
Published 2008“…Different adder architectures are investigated for suitability on synthesis implementation of large data bus size adder for efficient usage within the ALU. An adder algorithm using repetitive constructs in a parallel algorithm that allows for efficient and optimal synthesis for large data bus size is proposed as a suitable implementation for the adder within the ALU. …”
Get full text
Thesis -
6
Power system network splitting and load frequency control optimization using ABC based algorithms / Kanendra Naidu a/l Vijyakumar
Published 2015“…This research presents a modified optimization program for the system splitting problem in large scale power system based on Artificial Bee Colony algorithm and graph theory. …”
Get full text
Get full text
Thesis -
7
-
8
Development of obstacle avoidance technique in web-based geographic information system for traffic management using open source software
Published 2014“…The shortest path routing is one of the well-known network analysis techniques implemented in road management systems. Pg Routing as an extension of Postgre SQL/Post GIS database is an open source library that implements the Dijkstra shortest path algorithm. …”
Get full text
Get full text
Get full text
Article -
9
A 'snowflake' geometrical representation for optimised degree six 3-modified chordal ring networks
Published 2016“…A tree visualisation was constructed based on its connectivity to enable the generation of formulae for optimal diameter and average optimal path lengths. …”
Get full text
Get full text
Conference or Workshop Item -
10
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
Get full text
Get full text
Get full text
Thesis -
11
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
12
The implementation of post-processing data thinning for multibeam echo sounding data
Published 2006Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Development of an Automated Technique for Reconstructing Jawi Characters in Historical Documents
Published 2007“…The algorithms have been implemented using Matlab software version 6.5. …”
Get full text
Get full text
Thesis -
14
A Survey of metaheuristic approaches for curriculum based course timetabling problem
Published 2017“…Purpose - The aim of this paper is to explore approaches applied for solving CBCTT by presenting features of implementation related to it.The idea is to prepare references structure for future implementation.There are numerous surveys related to approaches in University course timetabling problem (UCTP) (Babaei, Karimpour, & Hadidi, 2014; Nandhini & Kanmani, 2009).Usually surveys that carried out involved post enrollment course timetabling problem (PECTT) and curriculum-based course timetabling problem (CBCTT) together in one literature. …”
Get full text
Get full text
Conference or Workshop Item -
15
Toward Quantum-Resilient PKI: A Systematic Literature Review of Post-Quantum Certificates Model
Published 2026journal::journal article -
16
A new countermeasure to combat the embedding-based attacks on the goldreich-goldwasser-halevi lattice-based cryptosystem
Published 2024“…Despite being considered the first practical lattice-based cryptosystem, interest from the post-quantum cryptography society in the Goldreich-Goldwasser-Halevi (GGH) lattice-based cryptosystem drastically drop due to the embedding-based attacks. …”
Get full text
Get full text
Get full text
Article -
17
A new countermeasure to combat the embedding-based attacks on the Goldreich-Goldwasser-Halevi lattice-based cryptosystem
Published 2024“…Despite being considered the first practical lattice-based cryptosystem, interest from the post-quantum cryptography society in the Goldreich-Goldwasser-Halevi (GGH) lattice-based cryptosystem drastically drop due to the embedding-based attacks. …”
Get full text
Get full text
Get full text
Article -
18
Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique
Published 2018“…The current research presents the implementation of an integrated kurtosisbased algorithm for a z-filter technique (Ikaz) to kurtosis ratio (Ikaz-kurtosis), for this allows automatic selection of the IMF that should be used. …”
Get full text
Get full text
Thesis -
19
Use of hybrid classification algorithm for land use and land cover analysis in data scarce environment
Published 2013“…In this study, vegetation indices, tasseled cap transformation, hybrid classification as a combination of k-means and support vector machine algorithms,and post-classification comparison were respectively implemented to detect and assess LULC in Halabja. …”
Get full text
Get full text
Thesis -
20
Discovering decision algorithm of distance protective relay based on rough set theory and rule quality measure
Published 2011“…The discovered decision algorithm and association rule from the Rough-Set based data mining had been compared with and successfully validated by those discovered using the benchmarking Decision-Tree based data mining strategy. …”
Get full text
Get full text
Thesis
