Search Results - (( using operational process algorithm ) OR ( using codification using algorithm ))
Search alternatives:
- using codification »
- codification using »
- using operational »
- process algorithm »
- using algorithm »
-
1
The Determination of Pile Capacity Using Artificial Neural-net: An Optimization Approach
Published 2001“…Using the developed algorithm, the safety measures involved are such as reliability index and the probability of failure; instead of only factor of safety if conventional deterministic approach is used. …”
Get full text
Get full text
Article -
2
Real time monitoring and controlling using Petri net algorithm for batch process plant / Mohamad Shaiful Osman
Published 2010“…This thesis searches the basic concepts and uses of the classical method Petri net algorithm in SCADA system to control and monitoring the process plant. …”
Get full text
Get full text
Thesis -
3
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Central Processing Unit is scheduled using different types of scheduling algorithms. …”
Get full text
Get full text
Thesis -
4
An improved Levenshtein algorithm for spelling correction word candidate list generation
Published 2016“…The proposed operational technique enhances Levenshtein algorithm in terms of the processing time of its executing without affecting its accuracy. …”
Get full text
Get full text
Get full text
Thesis -
5
Machining optimization using Firefly Algorithm / Farhan Md Jasni
Published 2020“…When any of these targets is not achieved, creating big problem to company and a total loss. The metaheuristic algorithm which being called as Firefly Algorithm (FA) is often used to solve various optimization problem in our daily life. …”
Get full text
Get full text
Student Project -
6
An adept edge detection algorithm for human knee osteoarthritis images
Published 2023“…Digital image processing comprises varieties of applications, where some of these used in medical image processing include convolution, edge detection as well as contrast enhancement. …”
Conference Paper -
7
Boundary extraction and corner point detection for map of kariah Kg. Bukit Kapar / 'Afina AmirHussin
Published 2019“…The purpose of study is to extract the boundary of image, find the corner point and compare between two algorithms. However, this study applied morphology operation to extract the boundary image by using erosion operation. …”
Get full text
Get full text
Thesis -
8
Hazard identification on fractionation column using rule based expert system
Published 2001“…The process-specific knowledge, which consists of process operation data and the process flow sheet, has been constructed using a HYSIS process simulator. …”
Get full text
Get full text
Article -
9
Optimization Of Two-Dimensional Dual Beam Scanning System Using Genetic Algorithms
Published 2008“…The knowledge acquired by the process is interpreted and mapped into vectors, which are kept in the database and used by the system to guide its reasoning process. …”
Get full text
Get full text
Thesis -
10
Hybrid bat algorithm-artificial neural network for modeling operating photovoltaic module temperature: article / Noor Rasyidah Hussin
Published 2014“…Bat algorithm is an optimizer tool and developed using of echolocation characteristics of bats, while the neural network is learning methods that approach the human brain using artificial neurons. …”
Get full text
Get full text
Article -
11
-
12
MINIMIZATION OF MACHINING PROCESS SEQUENCE BASED ON ANT COLONY ALGORITHM AND CONVENTIONAL METHOD
Published 2023“…Matlab software was used to develop the algorithm based on Ant Colony, which was then used to optimize the process sequence. …”
Get full text
Get full text
Article -
13
MINIMIZATION OF MACHINING PROCESS SEQUENCE BASED ON ANT COLONY ALGORITHM AND CONVENTIONAL METHOD
Published 2023“…Matlab software was used to develop the algorithm based on Ant Colony, which was then used to optimize the process sequence. …”
Get full text
Get full text
Article -
14
MINIMIZATION OF MACHINING PROCESS SEQUENCE BASED ON ANT COLONY ALGORITHM AND CONVENTIONAL METHOD
Published 2023“…Matlab software was used to develop the algorithm based on Ant Colony, which was then used to optimize the process sequence. …”
Get full text
Get full text
Article -
15
MINIMIZATION OF MACHINING PROCESS SEQUENCE BASED ON ANT COLONY ALGORITHM AND CONVENTIONAL METHOD
Published 2023“…Matlab software was used to develop the algorithm based on Ant Colony, which was then used to optimize the process sequence. …”
Get full text
Get full text
Article -
16
Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase
Published 2007“…This is due to crypto operations, which include symmetric encryption operations and hashing functions. …”
Get full text
Get full text
Conference or Workshop Item -
17
Improving security performance with parallel crypto operations in SSL bulk data transfer
Published 2009“…This is due to crypto operations, which include symmetric encryption operations and hashing functions. …”
Get full text
Get full text
Get full text
Article -
18
ANALYSIS AND OPTIMIZATION OF HYDROCYCLONE GEOMETRY USING BOX-BEHNKEN AND MULTI-OBJECTIVE OPTIMIZATION ALGORITHM
Published 2021“…However, the process of designing an optimal hydrocyclone is difficult due to its sensitivity to many parameters such as geometrical dimensions and operational parameters which is still lacking. …”
Get full text
Get full text
Thesis -
19
Hybrid bat algorithm hybrid-artificial neural network for modeling operating photovoltaic module temperature / Noor Rasyidah Hussin
Published 2014“…Bat algorithm is an optimizer tool and developed using of echolocation characteristics of bats, while the neural network is learning methods that approach the human brain using artificial neurons. …”
Get full text
Get full text
Thesis -
20
Enhancing performance of XTS cryptography mode of operation using parallel design
Published 2009“…The enhanced XTS mode of operation is implemented using OpenMP (Open specifications for Multi Processing) by careful use of parallelism strategy to divide encrypted data evenly among the available processors. …”
Get full text
Get full text
Thesis
