Search Results - (( using iterative efficient algorithm ) OR ( java simulation optimization algorithm ))

Refine Results
  1. 1

    SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing by Abd, Wamidh Jwdat

    Published 2019
    “…This work uses iterative smoothing algorithm to find an alternative path with less distance and energy consumption. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Energy efficient path reconstruction in wireless sensor network using iPath by Hasan, Sazlinah, Abd, Wamidh Jwdat, Ariffin, Ahmad Alauddin

    Published 2019
    “…This work uses iterative boosting algorithm to find an alternative path with less distance and energy consumption. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    On the spectra efficiency of low-complexity and resolution hybrid precoding and combining transceivers for mmWave MIMO systems by Uwaechia, Anthony Ngozichukwuka, Mahyuddin, Nor Muzlifah, Mohd Fadzil, Ain, Abdul) Latiff, Nurul Muazzah, Za'bah, Nor Farahidah

    Published 2019
    “…We then propose an algorithm which iteratively designs low-resolution (two-bit) hybrid analog-digital precoder and combiner (LrHPC), for pursuing efficiency while maximizing spectral efficiency. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6
  7. 7
  8. 8

    Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing by Husna, Jamal Abdul Nasir

    Published 2011
    “…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources. A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Ant colony optimization algorithm for load balancing in grid computing by Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2012
    “…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
    Get full text
    Get full text
    Get full text
    Monograph
  10. 10

    Parallel algorithms on some numerical techniques using PVM platform on a cluster of workstations by Alias, Norma, Mohamed, Mohd. Salleh Sahimi, Abdullah, Abdul Rahman

    Published 2002
    “…In this paper, a few parallel algorithms are explained in solving one dimensional heat model problem using Parallel Virtual Machine (PVM). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…The proposed method was tested using several simulation scenarios which demonstrated the efficiency of the algorithm by finding the path in term of smoothness, computational time efficiency and number of iterations, with a different number of outdoor static obstacles in the form of hills. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Multi-objective service restoration in distribution networks using genetic algorithm by Moazami, Ehsan

    Published 2013
    “…A proposed algorithm is investigated for radiality checking that is found very efficient in distribution restoration problems. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Comparison of higher order iterative methods in solving nonlinear equations / Muhammad Syafiq Salleh by Salleh, Muhammad Syafiq

    Published 2024
    “…This study emphasizes how important it is to balance iteration count and computational efficiency when choosing suitable iterative algorithms based on particular computational requirements.…”
    Get full text
    Get full text
    Thesis
  14. 14

    Augmented model based double iterative loop techniques for integrated system optimisation and parameter estimation of large scale industrial processes by Normah Abdullah, Brdys, M.A., Roberts, P.D.

    Published 1993
    “…The double iterative loop structures of the proposed algorithms use the real process measurement within the outer loops while the inner loops involve model based computation only. …”
    Get full text
    Get full text
    Article
  15. 15

    Adapting the Elitism on the Greedy Algorithm for Variable Strength Combinatorial Test Cases Generation by Bahomaid, Ameen A., Alsewari, Abdulrahman A., Zamli, Kamal Z., Alsariera, Yazan A.

    Published 2018
    “…The proposed variant-greedy algorithm employed the elitism mechanism alongside the iteration in order to improve its’ efficiency. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
    Review
  17. 17

    Self-adaptive conjugate method for a robust and efficient performance measure approach for reliability-based design optimization by Keshtegar, Behrooz, Baharom, Shahrizan, El-Shafie, Ahmed

    Published 2018
    “…The efficiency and robustness of the proposed SCG algorithm are compared with those of different reliability methods using five nonlinear concave/convex reliability problems and two mathematical/structural RBDO examples. …”
    Get full text
    Get full text
    Article
  18. 18

    The visualization of power density and temperature distribution of electronic system using elliptic PDE solver by Alias, Norma, Satam, Noriza, A. Ghaffar, Zarith Safiza

    Published 2008
    “…The numerical iterative methods that are being used results in efficient elliptic PDE solvers. …”
    Get full text
    Get full text
    Article
  19. 19

    On the security of digital signature protocol based on iterated function systems. by M. G. AL-Saidi, Nadia, Md. Said, Mohamad Rushdan

    Published 2011
    “…This new system can be expected to have at least the same computational security against some known attacks. A Diffie-Hellman algorithm is used to improve the security of the proposed protocol by generating the number of iteration that is used to find the attractor of the iterated function system, which is used to calculate the public key and the signature. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20