Search Results - parallel evaluation focus algorithm~

Refine Results
  1. 1

    Enhancing performance of XTS cryptography mode of operation using parallel design by Ahmed Alomari, Mohammad

    Published 2009
    “…In addition, the parallel XTS mode was also simulated using Twofish and RC6 encryption algorithms. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Communication and computational cost on parallel algorithm of PDE elliptic type by Alias, Norma

    Published 2009
    “…Due to this needs, this paper presents the parallel performance evaluations of algorithms that will be discussed in term of communication and computational cost.…”
    Get full text
    Get full text
    Book Section
  4. 4

    Parallel Execution of Runge-Kutta Methods for Solving Ordinary Differential Equations by Siri, Zailan

    Published 2004
    “…The method used here is actually have been tailored made for the purpose of parallel machine where the subsequent functions evaluations do not depend on the previous function evaluations. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Grid portal technology for web based education of parallel computing courses, applications and researches by Alias, Norma, Islam, Md. Rajibul, Mydin, Suhaimi, Hamzah, Norhafiza, Safiza Abd. Ghaffar, Zarith, Satam, Noriza, Darwis, Roziha

    Published 2009
    “…This paper proposes the web service education technology for postgraduate parallel computing course, e-learning students, real-time solutions and for supervising projects related to the application of parallel computing, that focuses on the fundamental principles to parallel computer architecture, multimedia, communication cost, master-worker model, parallel algorithm, web services and performance evaluations. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    A Community-Based Fault Isolation Approach for Effective Simultaneous Localization of Faults by Zakari, Abubakar, Lee, Sai Peck, Targio Hashem, Ibrahim Abaker

    Published 2019
    “…In an ideal case, faults are isolated into fault-focused clusters, each targeting a single fault for developers to localize them simultaneously in parallel. …”
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    An embedded database design and implementation of a parallel IEEE XTS storage encryption for mobile devices by Alomari, Mohammad Ahmed Mohammad

    Published 2017
    “…This study focuses on evaluating and enhancing the performance of data storage encryption inside mobile devices. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Parallel system for abnormal cell growth prediction based on fast numerical simulation by Alias, Norma, Islam, Md. Rajibul, Shahir, Rosdiana, Hamzah, Norhafizah, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Ludin, Eliana, Azami, Masrin

    Published 2010
    “…The development of the prediction system is the combinations of the parallel algorithms, open source software on Linux environment and distributed multiprocessor system. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer by Iqbal Basheer, Muhammmad Yunus

    Published 2023
    “…The proposed algorithms were evaluated to test their speed in handling streaming data. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13

    Dynamic partitioning and data allocation method on heterogeneous architecture / Muhammad Helmi Rosli by Rosli, Muhammad Helmi

    Published 2015
    “…Each experiment highlight the advantages and disadvantages of the experimental architecture.The disadvantages from each experiment prompts the design of dynamic parallel partitioning and allocating framework. The case study use for this experiment is Sobel edge detection algorithm. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Projecting named entity tags from a resource rich language to a resource poor language by Zamin, Norshuhani, Oxley, Alan, Abu Bakar, Zainab

    Published 2012
    “…The method computes the string similarity between the English words and the list of available lexemes in a pre-built lexicon that approximates the best NE mapping.The algorithm has been effectively evaluated using our own terrorism tagged corpus; it achieved satisfactory results in terms of precision, recall, and F-measure.An evaluation of the selected open source NER tool for English is also presented.…”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Projecting named entity tags from a resource rich language to a resource poor language by Zamin, N., Oxley, A., Bakar, Z.A.

    Published 2013
    “…The algorithm has been effectively evaluated using our own terrorism tagged corpus; it achieved satisfactory results in terms of precision, recall, and F-measure. …”
    Get full text
    Get full text
    Article
  16. 16

    Projecting named entity tags from a resource rich language to a resource poor language by Zamin, N., Oxley, A., Bakar, Z.A.

    Published 2013
    “…The algorithm has been effectively evaluated using our own terrorism tagged corpus; it achieved satisfactory results in terms of precision, recall, and F-measure. …”
    Get full text
    Get full text
    Article
  17. 17

    Projecting named entity tags from a resource rich language to a resource poor language by Zamin, N., Oxley, A., Bakar, Z.A.

    Published 2013
    “…The algorithm has been effectively evaluated using our own terrorism tagged corpus; it achieved satisfactory results in terms of precision, recall, and F-measure. …”
    Get full text
    Get full text
    Article
  18. 18

    Quantification and segmentation of breast cancer diagnosis: efficient hardware accelerator approach by Othman, Khairulnizam

    Published 2022
    “…In addition, a new image clustering algorithm anticipates the need for largescale serial and parallel processing. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    A security payment model for financial payment using mykad by Ahmad Zahari, Nurul Huda

    Published 2011
    “…However, if attack or intrusion is detected in less than 30 minutes, ARSA will automatically change the security algorithm to a new one. The evaluation of the MPM performance is measured with HP LoadRunner testing tools from which it is found that the response time of MPM with multithreading is better compared to the single thread model and credit card authorisation system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Hybrid harmony search-artificial intelligence models in credit scoring by Goh, Rui Ying

    Published 2019
    “…To further enhance the computational efficiency, the MHS hybrid models are parallelized. The four hybrid models are evaluated by comparing with standard statistical models across three datasets i.e. …”
    Get full text
    Get full text
    Thesis