Search Results - (( using function method algorithm ) OR ( using electron parallel algorithm ))
Search alternatives:
- method algorithm »
- function method »
- using function »
- using electron »
-
1
Analysis of evolutionary computing performance via mapreduce parallel processing architecture / Ahmad Firdaus Ahmad Fadzil
Published 2014“…Evolutionary computation (EC) is a method that is ubiquitously used to solve complex computation. …”
Get full text
Get full text
Thesis -
2
High performance simulation for brain tumors growth using parabolic equation on heterogeneous parallel computer systems
Published 2007“…The implementation of parallel algorithm based on parallel computing system is used to capture the growth of brain tumour. …”
Get full text
Get full text
Article -
3
PID Parameters Improvement for AGC in Three Parallel-Connected Power Systems
Published 2016“…The optimal parameters of the PID scheme optimized by the proposed MS algorithm are compared with that one’s obtained by GA algorithm, and the proposed method has proven that its performance is more efficient and improved as well. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Image classification using two dimensional wavelet coefficients with parallel computing
Published 2020“…The raster graphics are decomposed using various kind of wavelets together with numerous type of methods in this research to examine the process and the output coefficients of wavelet transform. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
The development of semantic meta-database: an ontology based semantic integration of biological databases
Published 2007“…The second algorithm incorporates parallel genetic algorithm with the semantic similarity measure algorithm. …”
Get full text
Get full text
Monograph -
6
Topology-aware hypergraph based approach to optimize scheduling of parallel applications onto distributed parallel architectures
Published 2020“…These steps have conducted using the MEMPHA model and ROA algorithm to optimize three metrics: execution time, total communication volume, and imbalance ratio (load balancing). …”
Get full text
Get full text
Thesis -
7
Digital quadrature compensators scheme for analog imperfections of quadrature modulator in wireless communication systems
Published 2016“…Adaptive algorithms used to estimate the QM’s imperfections, operate either in online or offline mode. …”
Get full text
Get full text
Thesis -
8
Studies on flat CORDIC implementation in field programmable gate arrays (FPGA) / Meera Subramaniam
Published 2004“…The CORDIC algorithm has been widely researched as an efficient hardware algorithm for the computation of trigonometric, hyperbolic and transcendental functions. …”
Get full text
Get full text
Thesis -
9
FPGA-based Implementation of SHA-256 with Improvement of Throughput using Unfolding Transformation
Published 2022“…One of the cryptography categories is a hash function. This paper proposes the implementation of the SHA-256 (Secure Hash Algorithm-256) hash function. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Fruit-Fly Based Searching Algorithm For Cooperative Swarming Robotic System
Published 2013“…A number of benchmark function processes were conducted to assess the performance of proposed FOA (Fly Optimisation Algorithm).…”
Get full text
Get full text
Thesis -
11
Optimal finite- time prescribed performance of servo pneumatic positioning with PID control tuning using an evolutionary mating algorithm
Published 2023“…This paper presents an optimum tuning on finite-time prescribed performance with PID (FT-PPC-PID) controller using the Evolutionary Mating Algorithm (EMA) approach for a pneumatic servo system’s (PSS) rod-piston positioning. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Projecting named entity tags from a resource rich language to a resource poor language
Published 2012“…The method computes the string similarity between the English words and the list of available lexemes in a pre-built lexicon that approximates the best NE mapping.The algorithm has been effectively evaluated using our own terrorism tagged corpus; it achieved satisfactory results in terms of precision, recall, and F-measure.An evaluation of the selected open source NER tool for English is also presented.…”
Get full text
Get full text
Get full text
Article -
13
Acquisition of context-based word recognition by reinforcement learning using a recurrent neural network
Published 2012“…The developed learning system has a 4-layered RNN and it was trained by BPTT method based on teaching signal that was generated by Q-Learning algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
14
Twofold Integer Programming Model for Improving Rough Set Classification Accuracy in Data Mining.
Published 2005“…The accuracy for rules and classification resulted from the TIP method are compared with other methods such as Standard Integer Programming (SIP) and Decision Related Integer Programming (DRIP) from Rough Set, Genetic Algorithm (GA), Johnson reducer, HoltelR method, Multiple Regression (MR), Neural Network (NN), Induction of Decision Tree Algorithm (ID3) and Base Learning Algorithm (C4.5); all other classifiers that are mostly used in the classification tasks. …”
Get full text
Get full text
Thesis -
15
On line fault detection for transmission line using power system stabilizer signals
Published 2007“…The expected results will show that the control action of PSS (Power System Stabilizer) using this method is more robust in damping the oscillation compared to the fixed conventional PSS. …”
Get full text
Get full text
Thesis -
16
Parallelization of noise reduction algorithm for seismic data on a beowulf cluster
Published 2010Get full text
Get full text
Citation Index Journal -
17
-
18
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…Based on the performance simulations, the new parallel algorithm gained speedup of 1.74 with 85% efficiency over the current sequential algorithm. …”
Get full text
Get full text
Thesis -
19
-
20
