Search Results - (( using iterative efficient algorithm ) OR ( basic optimization based algorithm ))

Refine Results
  1. 1

    Nomadic people optimizer (NPO) for large-scale optimization problems by Mohamd Salih, Sinan Qahtan

    Published 2019
    “…The basic component of the algorithm consists of several clans and each clan searches for the best place (or best solution) based on the position of their leader. …”
    Get full text
    Get full text
    Thesis
  2. 2

    A Survey Of Supervised Machine Learning In Wireless Sensor Network: A Power Management Perspective by Ul haq, Riaz, Norrozila, Sulaiman, Muhammad, Alam

    Published 2013
    “…Machine learning algorithms are iteration based algorithms, as the new knowledge is based on the previous predicted /calculated knowledge which helps to decrease errors in order to increase efficiency. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3
  4. 4

    On the spectra efficiency of low-complexity and resolution hybrid precoding and combining transceivers for mmWave MIMO systems by Uwaechia, Anthony Ngozichukwuka, Mahyuddin, Nor Muzlifah, Mohd Fadzil, Ain, Abdul) Latiff, Nurul Muazzah, Za'bah, Nor Farahidah

    Published 2019
    “…We then propose an algorithm which iteratively designs low-resolution (two-bit) hybrid analog-digital precoder and combiner (LrHPC), for pursuing efficiency while maximizing spectral efficiency. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6
  7. 7

    Optimal power flow based on fuzzy linear programming and modified Jaya algorithms by Alzihaymee, Warid Sayel Warid

    Published 2017
    “…In the proposed novel QOJaya algorithm, an intelligence strategy, namely, quasi-oppositional based learning (QOBL) is incorporated into the basic Jaya algorithm to enhance its convergence speed and solution optimality. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Parallel algorithms on some numerical techniques using PVM platform on a cluster of workstations by Alias, Norma, Mohamed, Mohd. Salleh Sahimi, Abdullah, Abdul Rahman

    Published 2002
    “…In this paper, a few parallel algorithms are explained in solving one dimensional heat model problem using Parallel Virtual Machine (PVM). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Fuzzy adaptive teaching learning-based optimization for solving unconstrained numerical optimization problems by Din, Fakhrud, Khalid, Shah, Fayaz, Muhammad, Gwak, Jeonghwan, Kamal Z., Zamli, Mashwani, Wali Khan

    Published 2022
    “…The performance of the fuzzy adaptive teaching learning-based optimization is evaluated against other metaheuristic algorithms including basic teaching learning-based optimization on 23 unconstrained global test functions. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…The proposed method was tested using several simulation scenarios which demonstrated the efficiency of the algorithm by finding the path in term of smoothness, computational time efficiency and number of iterations, with a different number of outdoor static obstacles in the form of hills. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Multi-objective service restoration in distribution networks using genetic algorithm by Moazami, Ehsan

    Published 2013
    “…A proposed algorithm is investigated for radiality checking that is found very efficient in distribution restoration problems. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Comparison of higher order iterative methods in solving nonlinear equations / Muhammad Syafiq Salleh by Salleh, Muhammad Syafiq

    Published 2024
    “…This study emphasizes how important it is to balance iteration count and computational efficiency when choosing suitable iterative algorithms based on particular computational requirements.…”
    Get full text
    Get full text
    Thesis
  13. 13

    Augmented model based double iterative loop techniques for integrated system optimisation and parameter estimation of large scale industrial processes by Normah Abdullah, Brdys, M.A., Roberts, P.D.

    Published 1993
    “…The double iterative loop structures of the proposed algorithms use the real process measurement within the outer loops while the inner loops involve model based computation only. …”
    Get full text
    Get full text
    Article
  14. 14

    Adapting the Elitism on the Greedy Algorithm for Variable Strength Combinatorial Test Cases Generation by Bahomaid, Ameen A., Alsewari, Abdulrahman A., Zamli, Kamal Z., Alsariera, Yazan A.

    Published 2018
    “…The proposed variant-greedy algorithm employed the elitism mechanism alongside the iteration in order to improve its’ efficiency. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Self-adaptive conjugate method for a robust and efficient performance measure approach for reliability-based design optimization by Keshtegar, Behrooz, Baharom, Shahrizan, El-Shafie, Ahmed

    Published 2018
    “…The efficiency and robustness of the proposed SCG algorithm are compared with those of different reliability methods using five nonlinear concave/convex reliability problems and two mathematical/structural RBDO examples. …”
    Get full text
    Get full text
    Article
  16. 16

    The visualization of power density and temperature distribution of electronic system using elliptic PDE solver by Alias, Norma, Satam, Noriza, A. Ghaffar, Zarith Safiza

    Published 2008
    “…The numerical iterative methods that are being used results in efficient elliptic PDE solvers. …”
    Get full text
    Get full text
    Article
  17. 17

    On the security of digital signature protocol based on iterated function systems. by M. G. AL-Saidi, Nadia, Md. Said, Mohamad Rushdan

    Published 2011
    “…This new system can be expected to have at least the same computational security against some known attacks. A Diffie-Hellman algorithm is used to improve the security of the proposed protocol by generating the number of iteration that is used to find the attractor of the iterated function system, which is used to calculate the public key and the signature. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19
  20. 20

    Diagonal-Newton Fast Iterative Shrinkage-Thresholding Algorithm for solving linear inverse problems in image restoration by Sim, Hong Seng, Goh, Yong Kheng, Chua, Sing Yee, Leong, Wah June

    Published 2025
    “…The Fast Iterative Shrinkage-Thresholding Algorithm (FISTA) is widely used to solve inverse problems arising from various image processing applications. …”
    Get full text
    Get full text
    Get full text
    Article