Showing 3,341 - 3,360 results of 4,971 for search '"ITER"', query time: 0.06s Refine Results
  1. 3341

    Chebyshev approximation of discrete polynomials and splines by Che Seman, Fauziahanim

    Published 2004
    “…The efficiency of each algorithm developed is evaluated on the basis of the number of iterations and extreme points required for convergence, and the magnitude of the errors generated. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 3342

    Chebyshev approximation of discrete polynomials and splines by Che Seman, Fauziahanim

    Published 2004
    “…The efficiency of each algorithm developed is evaluated on the basis of the number of iterations and extreme points required for convergence, and the magnitude of the errors generated. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3343

    Energy-Efficient Federated Learning With Resource Allocation for Green IoT Edge Intelligence in B5G by SALH, ADEB, NGAH, RAZALI, Audah, Lukman, SOON KIM, KWANG, ALJALOUD, KHALED A., TALIB, HAIRUL NIZAM

    Published 2023
    “…The remaining computational frequency allocation, transmission power allocation, and loss could be resolved with an Alternative Direction Algorithm (ADA) to reduce energy consumption and complexity at every iteration of FL time from IoT devices to edge intelligence nodes. …”
    Get full text
    Article
  4. 3344

    Some numerical methods for temperature and mass transfer simulation on the dehydration of herbs by Islam, Md. Rajibul, Alias, Norma

    Published 2010
    “…The performance analyses of Numerical methods are presented in terms of execution time, computational complexity, number of iterations, errors, accuracy and convergence rate.…”
    Article
  5. 3345

    Presentation-Based Learning and Peer Evaluation to Enhance Active Learning and Self-Confidence in the Financial Management Classroom by Sugeng, Bambang, Suryani, Ani Wilujeng

    Published 2018
    “…Purpose – The purpose of this study was to identify an effective learning strategy for students to engage authentically in their learning process.This study also aimed to introduce an innovative active learning approach to enhance students’ involvement and to strengthen self-confidence throughout their learning in the Financial Management classroom.The approach involved the adoption of structured and accountable presentation-based learning activities.Methodology – This study used action research design involving an iterative process of self-reflective cycles: planning, acting, observing and reflecting. …”
    Get full text
    Article
  6. 3346

    Evaluating the effectiveness of Scoring Rubrics Assisted Reading (SRAR) technique in the reading of software requirements work documents by Mkpojiogu, Emmanuel O.C., Hashim, Nor Laily

    Published 2017
    “…The method used is as follows: the use of SRAR, detection of defects, counting of defects present in the artifacts and refining of the artifact for each round/iteration of review. The defects found by reviewers were counted and presented as averages and percentages. …”
    Get full text
    Article
  7. 3347

    Balancing exploration and exploitation in ACS algorithms for data clustering by Jabbar, Ayad Mohammed, Sagban, Rafid, Ku-Mahamud, Ku Ruhana

    Published 2019
    “…The ACOC performs clustering based on random initial centroids, which are generated iteratively during the algorithm run. This makes the algorithm deviate from the clustering solution and performs a biased exploration. …”
    Get full text
    Article
  8. 3348

    Approximate Analytical Methods in Double Parametric Form Of Fuzzy Numbers for Solving Fuzzy Partial Differential Equations (S/O 14188) by Jameel, Ali Fareed, Haji Man, Noraziah

    Published 2021
    “…Therefore, this study has developed new approximate analytical methods in double parametric form of fuzzy numbers based on the original crisp Homotopy Perturbation Method, Variational Iteration Method, Homotopy Analysis Method and Optimal Homotopy Asymptotic Method to solve FPDEs involving fuzzy heat equation, fuzzy reaction-diffusion equation and fuzzy wave equation. …”
    Get full text
    Monograph
  9. 3349

    CMF-iteMS: An automatic threshold selection for detection of copy-move forgery by Nor Bakiah, Abd. Warif, Mohd. Yamani Idna, Idris, Rosli, Salleh, Ahsiah, Ismail

    Published 2019
    “…The CMF-iteMS recommends a PatchMatch-based CMF detection method that adapts Fourier-Mellin Transform (FMT) as the feature extraction technique while a new automatic threshold selection based on iterative means of regions size (iteMS) procedure is introduced to have flexibility in changing the threshold value for various characteristics (quality, sizes, and attacks) in each input image. …”
    Get full text
    Article
  10. 3350

    Support directional shifting vector: A direction based machine learning classifier by Kowsher, Md., Hossen, Imran, Tahabilder, Anik, Prottasha, Nusrat Jahan, Habib, Kaiser, Zafril Rizal, M Azmi

    Published 2021
    “…The positional error of the linear function has been modelled as a loss function which is iteratively optimized using the gradient descent algorithm. …”
    Get full text
    Article
  11. 3351

    Breast cancer disease classification using fuzzy-ID3 algorithm based on association function by Nur Farahaina, Idris, Mohd Arfian, Ismail, Mohd Saberi, Mohamad, Shahreen, Kasim, Zalmiyah, Zakaria, Sutikno, Tole

    Published 2022
    “…The FID3-AF algorithm is a hybridisation of the fuzzy system, the iterative dichotomizer 3 (ID3) algorithm, and the association function. …”
    Get full text
    Article
  12. 3352

    Optimization of two-sided assembly line balancing with resource constraints using modified particle swarm optimisation by Muhammad Razif, Abdullah Make, Mohd Fadzil Faisae, Ab Rashid

    Published 2022
    “…The good performance of MPSO was attributed to its ability to maintain particle diversity over iterations. The proposed 2S-ALB model and MPSO algorithm were validated later using an industrial case study. …”
    Get full text
    Get full text
    Article
  13. 3353

    Network instrusion prevention system ( NIPS) based on network intrusion detection system (NIDS) and ID3 algorithm decision tree classifier by Syurahbil, A

    Published 2011
    “…Network security has gained significant attention in research and industrial communities.Due to the increasing threat of the network intrusion,firewalls have become important elements of the security policy.Firewall performance highly depends toward number of rules,because the large more rules the consequence makes downhill performance progressively.Firewall can be allow or deny access network packets incoming and outgoing into Local Area Network(LAN),but firewall can not detect intrusion.To distinguishing an intrusion network packet or normal is very difficult and takes a lot of time.An analyst must review all the network traffics previously.In this study,a new way to make the rules that can determine network packet is intrusion or normal automatically.These rules implemented into firewall as prevention,which if there is a network packet that match these rules then network packet will be dropped.This is called Network Intrusion Prevention System(NIPS).These rules are generated based on Network Intrusion Detection System(NIDS)and Iterative Dichotomiser 3 (ID3)Algorithm Decision Tree Classifier,which as data training is intrusion network packet and normal network packets from previous network traffics.The experiment is successful,which can generate the rules then implemented into a firewall and drop the intrusion network packet automatically.Moreover,this way can minimize number of rules in firewall.…”
    Get full text
    Thesis
  14. 3354

    AN EMPIRICAL METHOD FOR IMPROVING THE QUALITY OF RXTE HEXTE SPECTRA by Grinberg, Victoria, McClintock, Jeffrey E., Pottschmidt, Katja, Rothschild, Richard E., Garcia, Javier A., Steiner, James F

    Published 2016
    “…Starting with the residual spectrum for Cluster B, via an iterative procedure we created the calibration tool hexBcorr for correcting any Cluster B spectrum of interest. …”
    Get full text
    Get full text
    Article
  15. 3355

    Lagrangian duality in 3D SLAM: Verification techniques and optimal solutions by Carlone, Luca, Calafiore, Giuseppe, Dellaert, Frank, Rosen, David Matthew, Leonard, John J

    Published 2017
    “…State-of-the-art techniques for simultaneous localization and mapping (SLAM) employ iterative nonlinear optimization methods to compute an estimate for robot poses. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 3356
  17. 3357

    Multistage Robust Mixed-Integer Optimization with Adaptive Partitions by Bertsimas, Dimitris J, Dunning, Iain Robert

    Published 2017
    “…The method repeats this process iteratively to further improve the objective until a desired gap is reached. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 3358

    Multi-atlas and label fusion approach for patient-specific MRI based skull estimation by Torrado-Carvajal, Angel, Herraiz, Joaquin L., Hernandez-Tamames, Juan A., San Jose-Estepar, Raul, Eryaman, Yigitcan, Rozenholc, Yves, Adalsteinsson, Elfar, Wald, Lawrence L., Malpica, Norberto

    Published 2017
    “…We have compared Majority Voting, Simultaneous Truth and Performance Level Estimation (STAPLE), Shape Based Averaging (SBA), and the Selective and Iterative Method for Performance Level Estimation (SIMPLE) algorithms. …”
    Get full text
    Get full text
    Article
  19. 3359

    Fast reconstruction for multichannel compressed sensing using a hierarchically semiseparable solver by Cauley, Stephen F., Xi, Yuanzhe, Bilgic, Berkin, Xia, Jianlin, Balakrishnan, Venkataramanan, Setsompop, Kawin, Adalsteinsson, Elfar, Wald, Lawrence

    Published 2017
    “…As an alternative to iterative methods that repetitively evaluate a forward CS+SENSE model, we introduce a technique for the fast computation of a compact inverse model solution. …”
    Get full text
    Get full text
    Article
  20. 3360

    Depression as a systemic syndrome: mapping the feedback loops of major depressive disorder by Wittenborn, A. K., Rick, J., Hosseinichimeh, N., Rahmandad, Hazhir

    Published 2017
    “…We assessed the strength of empirical support for each mechanism and prioritized those with support from validation studies. Through an iterative process, we synthesized the empirical literature and created a conceptual model of major depressive disorder. …”
    Get full text
    Get full text
    Article