Search Results - (( probable detection using algorithm ) OR ( parallel optimization path algorithm ))
Search alternatives:
- parallel optimization »
- probable detection »
- optimization path »
- using algorithm »
- path algorithm »
-
1
Tool path generation of contour parallel based on ant colony optimisation
Published 2016“…An Ant Colony Optimisation (ACO) method is used to optimize the tool path length because of its capability to find the shortest tool path length. …”
Get full text
Get full text
Article -
2
Minimizing machining airtime motion with an ant colony algorithm
Published 2016Get full text
Get full text
Article -
3
-
4
Restoration planning strategy of transmission system based on optimal energizing time of sectionalizing islands / Dian Najihah Abu Talib
Published 2019“…There are two discrete optimization techniques used in this work, which are the Artificial Bee Colony algorithm and Evolutionary Programming. …”
Get full text
Get full text
Get full text
Thesis -
5
Microcrack Detection And Noise Reduction In Integrated Circuit Packages
Published 2018“…Three algorithms are tested and evaluated in terms of microcrack detection and noise reduction which are probability based thresholding, histogram equalization, and modified Perona-Malik’s anisotropic diffusion methods. …”
Get full text
Get full text
Monograph -
6
-
7
Outlier detection in circular regression model using minimum spanning tree method
Published 2019“…Then, the performances of both algorithms were measured using “success” probability. …”
Get full text
Get full text
Conference or Workshop Item -
8
Summary of best efficient algorithms on cognitive radio cooperative spectrum sensing to improve QoS
Published 2014“…This paper focuses on optimality of analytical study on the common soft fusion (SDF) CSS based on different iterative algorithms which confirm low total probability of error and high probability of detection in details. …”
Get full text
Get full text
Conference or Workshop Item -
9
Fault section detection and location on distribution network using analytical voltage sags database
Published 2006“…By doing this all the possible sections due to the fault can be selected. Finally, the most probable faulty section is identified using probability approach.This paper presents the implemented algorithms and the test of the algorithms on typical distribution networks. …”
Get full text
Get full text
Conference or Workshop Item -
10
A novel large-bit-size architecture and microarchitecture for the implementation of Superscalar Pipeline VLIW microprocessors
Published 2008“…Different adder architectures are investigated for suitability on synthesis implementation of large data bus size adder for efficient usage within the ALU. An adder algorithm using repetitive constructs in a parallel algorithm that allows for efficient and optimal synthesis for large data bus size is proposed as a suitable implementation for the adder within the ALU. …”
Get full text
Thesis -
11
Applying Bayesian probability for Android malware detection using permission features
Published 2021“…This paper proposes a malware detection system based on permission features using Bayesian probability to battle the malware issue. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Coalition formation for throughput enhancement in cognitive radio wireless networks
Published 2015“…We show using simulations that using the modified gale shapely algorithm for coalition formation yields significant gains in term of reduced false alarm probability and increased throughput per cognitive radio user as compared to non-cooperative scenario.…”
Get full text
Get full text
Get full text
Article -
13
Detecting the probability of diabetic retinopathy / Nurul Farhanah Khairol Nizar
Published 2020“…The purpose of this project is to develop a system to help in detecting the possibility of having Diabetic Retinopathy using rule-based system on web-based application. …”
Get full text
Get full text
Thesis -
14
A Bayesian probability model for Android malware detection
Published 2021Get full text
Get full text
Get full text
Article -
15
Novel distributed algorithm for coalition formation for enhanced spectrum sensing in cognitive radio networks
Published 2017“…The coalitions formed using the algorithm are stable and do not deviate from the final matching. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
16
Novel distributed algorithm for coalition formation in cognitive radio networks for throughput enhancement using matching theory
Published 2017“…The coalitions formed using the algorithm are stable and do not deviate from the final matching. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
-
18
Coalition formation for cooperative spectrum sharing in cognitive radio wireless networks using Gale Shapley Algorithm
Published 2016“…The cooperation tends to increase the spectrum sensing performance which in turn results in increased transmission opportunities. In this paper we use the concepts from matching theory, specifically we use gale-shapely algorithm, to form the coalition among cognitive radio user for collaborative spectrum sensing under target detection probability constraint. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
A Bayesian probability model for Android malware detection
Published 2022Get full text
Get full text
Get full text
Article -
20
Improved undetected error probability model for JTEC and JTEC-SQED coding schemes
Published 2013“…The probabilities of the failing patterns are used to build the new models. …”
Get full text
Get full text
Conference or Workshop Item
