Search Results - (( using iterative efficient algorithm ) OR ( basic optimization method algorithm ))

Refine Results
  1. 1

    Towards large scale unconstrained optimization by Abu Hassan, Malik

    Published 2007
    “…The main difficulty in dealing with large scale problems is the fact that effective algorithms for small scale problems do not necessarily translate into efficient algorithms when applied to solve large scale problems. …”
    Get full text
    Get full text
    Get full text
    Inaugural Lecture
  2. 2

    Nomadic people optimizer (NPO) for large-scale optimization problems by Mohamd Salih, Sinan Qahtan

    Published 2019
    “…The basic component of the algorithm consists of several clans and each clan searches for the best place (or best solution) based on the position of their leader. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    On the spectra efficiency of low-complexity and resolution hybrid precoding and combining transceivers for mmWave MIMO systems by Uwaechia, Anthony Ngozichukwuka, Mahyuddin, Nor Muzlifah, Mohd Fadzil, Ain, Abdul) Latiff, Nurul Muazzah, Za'bah, Nor Farahidah

    Published 2019
    “…We then propose an algorithm which iteratively designs low-resolution (two-bit) hybrid analog-digital precoder and combiner (LrHPC), for pursuing efficiency while maximizing spectral efficiency. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Particle swarm optimization (PSO) for CNC route problem by Nur Azia Azwani, Ismail

    Published 2002
    “…We often see many of the method of Genetic Algorithm (GA), Ant Colony Optimization (ACO), Simulated Annealing Algorithm (SAA) and PSO are used for any optimization problems. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  7. 7
  8. 8

    Parallel algorithms on some numerical techniques using PVM platform on a cluster of workstations by Alias, Norma, Mohamed, Mohd. Salleh Sahimi, Abdullah, Abdul Rahman

    Published 2002
    “…In this paper, a few parallel algorithms are explained in solving one dimensional heat model problem using Parallel Virtual Machine (PVM). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Optimal power flow based on fuzzy linear programming and modified Jaya algorithms by Alzihaymee, Warid Sayel Warid

    Published 2017
    “…Meanwhile, the proposed QOJaya algorithm produces better results than the basic Jaya method in terms of solution optimality and convergence speed. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…The proposed method was tested using several simulation scenarios which demonstrated the efficiency of the algorithm by finding the path in term of smoothness, computational time efficiency and number of iterations, with a different number of outdoor static obstacles in the form of hills. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Voting algorithms for large scale fault-tolerant systems by Karimi, Abbas

    Published 2011
    “…To solve this problem and gain benefits of this algorithm, we employed parallel algorithm technique and by using optimal number of processors, we could propose optimal algorithms known as Parallel Average Voting and Parallel Weighted Average Voting which both have optimal time complexity and less calculation cost. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Multi-objective service restoration in distribution networks using genetic algorithm by Moazami, Ehsan

    Published 2013
    “…A proposed algorithm is investigated for radiality checking that is found very efficient in distribution restoration problems. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Comparison of higher order iterative methods in solving nonlinear equations / Muhammad Syafiq Salleh by Salleh, Muhammad Syafiq

    Published 2024
    “…This study emphasizes how important it is to balance iteration count and computational efficiency when choosing suitable iterative algorithms based on particular computational requirements.…”
    Get full text
    Get full text
    Thesis
  14. 14

    Augmented model based double iterative loop techniques for integrated system optimisation and parameter estimation of large scale industrial processes by Normah Abdullah, Brdys, M.A., Roberts, P.D.

    Published 1993
    “…The double iterative loop structures of the proposed algorithms use the real process measurement within the outer loops while the inner loops involve model based computation only. …”
    Get full text
    Get full text
    Article
  15. 15

    Adapting the Elitism on the Greedy Algorithm for Variable Strength Combinatorial Test Cases Generation by Bahomaid, Ameen A., Alsewari, Abdulrahman A., Zamli, Kamal Z., Alsariera, Yazan A.

    Published 2018
    “…The proposed variant-greedy algorithm employed the elitism mechanism alongside the iteration in order to improve its’ efficiency. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Self-adaptive conjugate method for a robust and efficient performance measure approach for reliability-based design optimization by Keshtegar, Behrooz, Baharom, Shahrizan, El-Shafie, Ahmed

    Published 2018
    “…The efficiency and robustness of the proposed SCG algorithm are compared with those of different reliability methods using five nonlinear concave/convex reliability problems and two mathematical/structural RBDO examples. …”
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    The visualization of power density and temperature distribution of electronic system using elliptic PDE solver by Alias, Norma, Satam, Noriza, A. Ghaffar, Zarith Safiza

    Published 2008
    “…The numerical iterative methods that are being used results in efficient elliptic PDE solvers. …”
    Get full text
    Get full text
    Article
  19. 19

    On the security of digital signature protocol based on iterated function systems. by M. G. AL-Saidi, Nadia, Md. Said, Mohamad Rushdan

    Published 2011
    “…This new system can be expected to have at least the same computational security against some known attacks. A Diffie-Hellman algorithm is used to improve the security of the proposed protocol by generating the number of iteration that is used to find the attractor of the iterated function system, which is used to calculate the public key and the signature. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20