Search Results - parallel ((detection method) OR (evaluation method)) algorithm

Search alternatives:

Refine Results
  1. 1

    Parallel system for abnormal cell growth prediction based on fast numerical simulation by Alias, Norma, Islam, Md. Rajibul, Shahir, Rosdiana, Hamzah, Norhafizah, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Ludin, Eliana, Azami, Masrin

    Published 2010
    “…The paper focuses on a numerical method for detecting, visualizing and monitoring abnormal cell growth using large-scale mathematical simulations. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer by Iqbal Basheer, Muhammmad Yunus

    Published 2023
    “…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems by Mohammad Khamees Khaleel, Alsajri

    Published 2022
    “…While the effectiveness of some machine learning algorithms in detecting certain types of network intrusion has been ascertained, the situation remains that no single method currently exists that can achieve consistent results when employed for the detection of multiple attack types. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Forward-Backward Time Stepping with Automated Edge-preserving Regularization Technique for Wood Defects Detection by Yong, Guang

    Published 2019
    “…Therefore, the microwave imaging technique is proposed to detect the wood defects. In this thesis, Forward-Backward Time-Stepping (FBTS) method is applied to microwave imaging wood defect detection application. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Dual search maximum power point algorithm based on mathematical analysis under partially-shaded conditions by Hajighorbani, Shahrooz

    Published 2016
    “…Interestingly, the experimental results under different irradiances also show that the proposed algorithm can detect the GMPP faster in comparison with other methods. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Dynamic partitioning and data allocation method on heterogeneous architecture / Muhammad Helmi Rosli by Rosli, Muhammad Helmi

    Published 2015
    “…Each experiment highlight the advantages and disadvantages of the experimental architecture.The disadvantages from each experiment prompts the design of dynamic parallel partitioning and allocating framework. The case study use for this experiment is Sobel edge detection algorithm. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Parallel Execution of Runge-Kutta Methods for Solving Ordinary Differential Equations by Siri, Zailan

    Published 2004
    “…The method used here is actually have been tailored made for the purpose of parallel machine where the subsequent functions evaluations do not depend on the previous function evaluations. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Enhanced and effective parallel optical flow method for vehicle detection and tracking by Bhaskar, P.K., Yong, S.-P., Jung, L.T.

    Published 2016
    “…With a view to do improvements, it is proposed to develop an unique algorithm for vehicle data recognition and tracking using Parallel Optical Flow method based on Lucas-Kanade algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Parallel algorithms for numerical simulations of EHD ion-drag micropump on distributed parallel computing systems by Shakeel Ahmed, Kamboh

    Published 2014
    “…To implement the parallel algorithms a distributed parallel computing laboratory using easily available low cost computers is setup. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Enhancing performance of XTS cryptography mode of operation using parallel design by Ahmed Alomari, Mohammad

    Published 2009
    “…In addition, the parallel XTS mode was also simulated using Twofish and RC6 encryption algorithms. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Parallel execution of diagonally implicit Runge-Kutta methods for solving IVPs. by Ismail, Fudziah, Siri, Zailan, Othman, Mohamad, Suleiman, Mohamed

    Published 2009
    “…Diagonally Implicit Runge-Kutta (DIRK) methods are amongst the most useful and cost-effective methods for solving initial value problems but the dependency of the functions evaluations on the previous functions evaluations makes DIRK method not so favourable for parallel computers. …”
    Get full text
    Get full text
    Article
  12. 12

    Performance Evaluation Of Combined Code-Space Division Multiple Access With Enhanced Parallel Interference Cancellation by Odeh, Nidhal A.S.

    Published 2007
    “…Parallel interference cancellation (PIC) as a suboptimal multiuser detection (MUD) was employed after the matched filter (MF) receiver. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Communication and computational cost on parallel algorithm of PDE elliptic type by Alias, Norma

    Published 2009
    “…Due to this needs, this paper presents the parallel performance evaluations of algorithms that will be discussed in term of communication and computational cost.…”
    Get full text
    Get full text
    Book Section
  14. 14
  15. 15
  16. 16

    Analysis of evolutionary computing performance via mapreduce parallel processing architecture / Ahmad Firdaus Ahmad Fadzil by Ahmad, Ahmad Firdaus

    Published 2014
    “…MR is an emerging parallel processing framework that hides the complex parallelization processes by employing the functional abstraction of "map and reduce" The Performance of the parallelized GA via MR and PSO via MR are evaluated using an analogous case study to find out the speedup and efficiency in order to measure the scalability of both proposed algorithms. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Transient electromagnetic-thermal nondestructive testing by He, Yunze, Gao, Bin, Sophian, Ali, Yang, Ruizhen

    Published 2017
    “…Transient Electromagnetic-Thermal Nondestructive Testing: Pulsed Eddy Current and Transient Eddy Current Thermography covers three key areas of theories, methods and applications, primarily the multi-physics field, including eddy current, heat conduction and Infrared radiation for defect evaluation, lateral heat conduction, which is analyzed to detect parallel cracks, and longitudinal heat conduction, which is analyzed to detect depth defect, or that which is beyond skin depth. …”
    Get full text
    Get full text
    Get full text
    Book
  18. 18
  19. 19
  20. 20

    Skin region detector for real time face detection system by Mohd Mustafah, Yasir, Azman, Amelia Wong

    Published 2012
    “…In the implementation, the region of interest is detected using two algorithms, running in parallel. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper