Search Results - (( software verification method algorithm ) OR ( parallel optimization path algorithm ))

Refine Results
  1. 1
  2. 2

    Tool path generation of contour parallel based on ant colony optimisation by Abdullah, Haslina, Ramli, Rizauddin, Abd Wahab, Dzuraidah, Abu Qudeiri, Jaber

    Published 2016
    “…An Ant Colony Optimisation (ACO) method is used to optimize the tool path length because of its capability to find the shortest tool path length. …”
    Get full text
    Get full text
    Article
  3. 3
  4. 4
  5. 5

    Development of android application for peninsular Malaysia GEOID height calculator / Mohamad Nazir Md Nazri by Md Nazri, Mohamad Nazir

    Published 2021
    “…Verification of algorithm of interpolation method had verified that only two interpolation methods are useable for producing results which are Bilinear Interpolation and Inverse Distance Weighted. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Restoration planning strategy of transmission system based on optimal energizing time of sectionalizing islands / Dian Najihah Abu Talib by Dian Najihah , Abu Talib

    Published 2019
    “…There are two discrete optimization techniques used in this work, which are the Artificial Bee Colony algorithm and Evolutionary Programming. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9
  10. 10

    A novel large-bit-size architecture and microarchitecture for the implementation of Superscalar Pipeline VLIW microprocessors by Lee, Weng Fook

    Published 2008
    “…Different adder architectures are investigated for suitability on synthesis implementation of large data bus size adder for efficient usage within the ALU. An adder algorithm using repetitive constructs in a parallel algorithm that allows for efficient and optimal synthesis for large data bus size is proposed as a suitable implementation for the adder within the ALU. …”
    Get full text
    Thesis
  11. 11

    Numerical simulation and experimental verification on distortions induced by wire-arc additive manufacturing components and costing analysis / Keval Priapratama Prajadhiana by Prajadhiana, Keval Priapratama

    Published 2024
    “…In order to minimize the computational time of numerical WAAM simulation, two method has been proposed. The first method is utilizing the lumping layering of WAAM deposition to minimize the numbers of elements and the second method is by using Inherent Strain Method (ISM) with the help of commercial finite element software MSC Marc/Mentat. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Noise removal methodologies for lung cancer diagnosis by Nur Fatin Razlieya, Mohd Razali

    Published 2019
    “…Therefore, the algorithm will be developed and implemented in MATLAB software. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13

    Feature identification in a real surface metrology analysis by means of Double Iteration Sobel (DIS) / Ainaa Farhanah Mohd Razali by Mohd Razali, Ainaa Farhanah

    Published 2022
    “…The results of the verification of the system algorithm on the simulated 3D areal surface topography of a sloped bumps shows that the system algorithm can effectively identified the edges features and segmented them following the shape partem of the surface features of the sloped bumps. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower by Gatea, Sarah Jabbar

    Published 2018
    “…The results are used to develop the hybrid learning algorithm based on the AdaBoost, Bagging, and RUSBoost methods to predict the damage in the tower based on dynamic frequency domain. …”
    Get full text
    Get full text
    Thesis
  15. 15

    A 'snowflake' geometrical representation for optimised degree six 3-modified chordal ring networks by Chien, Stephen Lim Een, Raja Maamor Shah, Raja Noor Farah Azura, Othman, Mohamed

    Published 2016
    “…A tree visualisation was constructed based on its connectivity to enable the generation of formulae for optimal diameter and average optimal path lengths. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques by Mustafa, Ahmed Sudad

    Published 2017
    “…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Verification of volume-of-fluid (VOF) simulation for thin liquid film applications by Balachandran S., Shuaib N.H., Hasini H., Yusoff M.Z.

    Published 2023
    “…This paper describes the application of the built-in Volume-of-Fluid (VOF) model in the commercial Computational Fluid Dynamics (CFD) software FLUENTTM and the verification of its accuracy. …”
    Conference paper
  18. 18
  19. 19

    Bundle Sorting Mobile Application by Zulkifley, Muhammad Dzofir Hafiz

    Published 2020
    “…The purpose of the articles and reports is to establish IT solutions to improve the counting method of clothing production quality. It also offers insight into the method and process of improved surveillance of clothing in the fabric production line via an image processing algorithm that reduces the uncertainty workflow throughout actual clothing storage and conversion of clothing details into quantity. …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    Computational dynamic support model for social support assignments around stressed individuals among graduate students by Al-Shorman, Roqia Rateb

    Published 2020
    “…Furthermore, this study provides an alternative method for software engineers in intelligent stress management systems to integrate social support-based concepts as one of the mechanisms in addressing the support of an individual with cognitive related stress.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis