Search Results - parallel information needs algorithm*

Refine Results
  1. 1
  2. 2

    Parallelization Of CCSDS Hyperspectral Image Compression Using C++ by Tan, Lit Chez

    Published 2018
    “…Next, the parallelizable section of the algorithm is identified and coded using OpenMP. The algorithm has been parallelized by dividing the bands of the hyperspectral image into several continuous chunks and running them concurrently. …”
    Get full text
    Get full text
    Monograph
  3. 3

    A GPGPU Approach to Accelerate Ant Swarm Optimization Rough Reducts (ASORR) Algorithm by Udayanti, Erika Devi, Choo, Yun Huoy, Draman @ Muda, Azah Kamilah, Nugroho, Fajar Agung

    Published 2012
    “…For the complex matrix calculation in a single cpu, it will take a long computing time to build the discernibility matrix whereas the execution time of an algorithm is needed to be considered. This paper proposed an parallel approach to accelerate the execution time of ASORR algorithm which is utilizing GPGPU that supports high speed parallel computing. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Scaled parallel iterative method for finding real roots of nonlinear equations by Chen, Chuei Yee, Ghazali, Abdul Hakim, Leong, Wah June

    Published 2021
    “…Since many nonlinear functions are expressible as polynomials via interpolation, there is a need to devise fast and accurate algorithms in finding root(s) of the interpolating polynomial. …”
    Get full text
    Get full text
    Article
  5. 5

    Scaled parallel iterative method for finding real roots of nonlinear equations by Chuei, Yee Chen, Ghazali, Abdul Hakim, Wah, June Leong

    Published 2021
    “…Since many nonlinear functions are expressible as polynomials via interpolation, there is a need to devise fast and accurate algorithms in finding root(s) of the interpolating polynomial. …”
    Get full text
    Get full text
    Article
  6. 6

    Development of an automatics parallel parking system for nonholonomic mobile robot by Mohd Fairuz , Abdollah, Syed Najib , Syed Salim, Irma Wani , Jamaludin, Muhammad Nizam , Kamarudin

    Published 2011
    “…The proposed idea of the path planning is based on the geometrical equations in which the needed information is referring to the distance between the mobile robot and the adjacent object. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Automated plant recognition system based on multi-objective parallel genetic algorithm and neural network by Sefidgar, Seyed Mohammad Hossein

    Published 2014
    “…To conclude, multi objective parallel genetic algorithm can automatically tune feed forward neural network to classify the dataset with a good classification rate.…”
    Get full text
    Get full text
    Thesis
  8. 8

    Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM) by Shuwandy, Moceheb Lazam

    Published 2012
    “…In addition, it uses two keys to encryption and decryption. However, this method needs to be develops and supports the protection of information. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Development of Lifting-based VLSI Architectures for Two-Dimensional Discrete Wavelet Transform by MOHAMED KOKO, IBRAHIM SAEED

    Published 2010
    “…Finally, to show the architectural models developed for 2-D DWT are simple to control, the control algorithms for 4-parallel architecture based on the first scan method is developed. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Acquisition of context-based word recognition by reinforcement learning using a recurrent neural network by Ahmad Afif, Mohd Faudzi

    Published 2012
    “…The flexible and intelligent recognition is not only depending on the informatiOn that belonged by target object, but also is supported by other information, including past knowledge and contextual information. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Acquisition of context-based word recognition by reinforcement learning using a recurrent neural network by Ahmad Afif, Mohd Faudzi

    Published 2012
    “…The flexible and intelligent recognition is not only depending on the informatiOn that belonged by target object,but also is supported by other information, including past knowledge and contextual information.For an example, when we read a book, we do not usually seem to read it -by recognizing each character one by one. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13
  14. 14

    Agro-ento bioinformation: towards the edge of reality by Syed Hassan, Syed Tajuddin

    Published 2002
    “…Bioinformation, in brief, comprises biology, information algorithms, information technology, and communication protocols. …”
    Get full text
    Get full text
    Inaugural Lecture
  15. 15

    Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer by Iqbal Basheer, Muhammmad Yunus

    Published 2023
    “…We built three algorithms to detect anomalies in the streaming data autonomously. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Real-time Rotation Invariant Hand Tracking Using 3D Data by Rosdiyana, Samad, M. Zabri, Abu Bakar, Pebrianti, Dwi, Nicolaas Lim, Yong Aan

    Published 2014
    “…When use color information needs to extract many different skin color. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17
  18. 18
  19. 19

    Web based personalized university timetable for UiTM students using genetic algorithm / Mohd Radhi Fauzan Jamli and Ahmad Firdaus Ahmad Fadzil by Jamli, Mohd Radhi Fauzan, Ahmad Fadzil, Ahmad Firdaus

    Published 2024
    “…The proposed approach utilizes genetic algorithms to dynamically produce optimized timetables based on individual student needs, with real-time data scraping from 'iCRESS' ensuring the system stays up to date with the latest course information for accurate timetable generation. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    A review on security and privacy issues in E-learning and the MapReduce aproach by Noor Akma, Abu Bakar, Mazlina, Abdul Majid, Khalid, Adam, Kirahman, Ab Razak, Noorhuzaimi@Karimah, Mohd Noor

    Published 2019
    “…Log files are generated at every level of the computing infrastructure and represent a valuable source of information in detecting attacks. Thus, log files are big volume and velocity needed for the higher in data processing time. …”
    Get full text
    Get full text
    Get full text
    Article