Search Results - (( software version using algorithm ) OR ( parallel optimization path algorithm ))
Search alternatives:
- parallel optimization »
- optimization path »
- using algorithm »
- path algorithm »
- version using »
-
1
Tool path generation of contour parallel based on ant colony optimisation
Published 2016“…An Ant Colony Optimisation (ACO) method is used to optimize the tool path length because of its capability to find the shortest tool path length. …”
Get full text
Get full text
Article -
2
Minimizing machining airtime motion with an ant colony algorithm
Published 2016Get full text
Get full text
Article -
3
-
4
Restoration planning strategy of transmission system based on optimal energizing time of sectionalizing islands / Dian Najihah Abu Talib
Published 2019“…There are two discrete optimization techniques used in this work, which are the Artificial Bee Colony algorithm and Evolutionary Programming. …”
Get full text
Get full text
Get full text
Thesis -
5
A novel large-bit-size architecture and microarchitecture for the implementation of Superscalar Pipeline VLIW microprocessors
Published 2008“…Different adder architectures are investigated for suitability on synthesis implementation of large data bus size adder for efficient usage within the ALU. An adder algorithm using repetitive constructs in a parallel algorithm that allows for efficient and optimal synthesis for large data bus size is proposed as a suitable implementation for the adder within the ALU. …”
Get full text
Thesis -
6
Real-Time Face Detection And Tracking Using Software And Hardware Design
Published 2018“…The face location was determined by calculating the centroid of the detected region. A software version of the algorithm was independently implemented and tested in MATLAB Simulink. …”
Get full text
Get full text
Monograph -
7
Improving collection of data type evidence and the integrity of evidence collected using SHA-256 hashing algorithm for web browsers
Published 2024“…The existing tools for evidence collection primarily rely on SHA-1 hashing and using older version windows and software toolkits version. …”
Get full text
Get full text
Get full text
Article -
8
-
9
-
10
Design, Develop And Perform Robustness Test Of Analyzer2 ver2
Published 2010“…The objective of this project is mainly to verify the 6 algorithms used in old version of Analyze2 Software through research and discussion.…”
Get full text
Get full text
Final Year Project -
11
Security mechanism for wireless Mobile Ad Hoc Networks (MANET)
Published 2006“…This report provides an overview of wireless ad hoc networks, wireless threats, cryptography background and the security algorithms for this encryption method. The One Time Pad algorithm and Caesar Cipher algorithms are implemented using LabVIEW software. …”
Get full text
Get full text
Student Project -
12
A 'snowflake' geometrical representation for optimised degree six 3-modified chordal ring networks
Published 2016“…A tree visualisation was constructed based on its connectivity to enable the generation of formulae for optimal diameter and average optimal path lengths. …”
Get full text
Get full text
Conference or Workshop Item -
13
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
Get full text
Get full text
Get full text
Thesis -
14
An enhanced mobile internet protocol version 6 (IPv6) with multicast function and hierarchical design.
Published 2006“…Mobile IPv6 mechanism requires some handover algorithm when it changes its point of attachment in the Internet.An enhanced micro mobility handover algorithm is developed on top of mobile IPv6. …”
Get full text
Patent -
15
Application of genetic algorithm for optimal voltage control of the power system / Mohd Supian Yahya
Published 1998“…All simulation was done on the MATLAB software package version 4.2c. 1.…”
Get full text
Get full text
Thesis -
16
Solving 0/1 Knapsack Problem using Opposition-based Whale Optimization Algorithm (OWOA)
Published 2019Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Statistical analysis on enhanced 3D-AES block cipher cryptographic algorithm / Nor Azeala Mohd Yusof
Published 2021“…Many algorithms such as AES, LED, KTANTAN, KATAN, L-Block, SIMON, SPECK, RECTANGLE, and GRAIN-128 have performed randomness test using NIST Statistical Test Suite. …”
Get full text
Get full text
Thesis -
18
-
19
-
20
A comparative study and simulation of object tracking algorithms
Published 2020Get full text
Get full text
Get full text
Conference or Workshop Item
