-
821
Diagonal quasi-Newton updating formula using log-determinant norm
Published 2015“…The popularity of this method is due to the fact that only the gradient of the objective function is required at each iterate. Since second derivatives (Hessian) are not required, quasi-Newton method is sometimes more efficient than the Newton method, especially when the computation of Hessian is expensive. …”
Get full text
Conference or Workshop Item -
822
Block method with Hermite interpolation for numerical solution of delay differential equations
Published 2012“…The implicit method is solved using predictor-corrector scheme where the corrector is iterated until convergence. Grid point formulae are derived using a predictor and a corrector of order five. …”
Get full text
Conference or Workshop Item -
823
A low complexity high efficiency hybrid multiplicative-additive crest factor reduction for OFDM systems
Published 2017“…Then, a new optimization scheme is introduced, in which only a single two-phase sequence and four iterations need to be applied. Numerical analysis shows that the proposed hybrid technique achieves better CF reduction performance with significantly lower complexity and better bit error rate performance than the existing scrambling (multiplicative) and additive CF techniques.…”
Get full text
Article -
824
User-driven design of decision support systems for polycentric environmental resources management
Published 2017“…To address these issues, we present a participatory framework for designing EDSS that emphasizes a more complete understanding of the decision making structures and iterative design of the user interface. We illustrate the application of the framework through a case study within the context of water-stressed upstream/downstream communities in Lima, Peru.…”
Get full text
Article -
825
Using IT/ICT as a new medium toward implementation of interactive architectural communication cultures
Published 2008“…Design is a multi-aspect, iterative, and complicated exclusive human activity and a critical aspect of many modern industries. …”
Get full text
Conference or Workshop Item -
826
Ontology development life cycle: a review
Published 2019“…Some methodologies followan iterative development life cycle and some are not.Their application in real project is comparatively limited despites of their growing number. …”
Get full text
Article -
827
Urban transit frequency setting using Multiple Tabu Search with parameter control
Published 2019“…The chosen parameter gives considerable effect on the objective functions compared to other parameters such as the size of tabu list and the number of iterations. Using statistical hypotheses evaluation, the results indicate that the number of domains determines the quality of solutions for different instances of the problem. …”
Get full text
Article -
828
Vector least-squares solutions for coupled singular matrix equations
Published 2007“…Finally, we recover the iterative methods to the weighted case in order to obtain the minimum D-norm G-vector least-squares solutions for the coupled Sylvester matrix equations and the results lead to the least-squares solutions and invertible solutions, as a special case. © 2006 Elsevier B.V. …”
Get full text
Article -
829
Direct integration of the third-order two point and multipoint Robin type boundary value problems
Published 2021“…Instead, its implementation involved the use of shooting technique, which included the Newton divided difference formula employed for the iterative part, for the estimation of the initial guess. …”
Get full text
Article -
830
Topology optimization for custom bed-resting ankle foot orthosis
Published 2024“…The design is then optimized using a topology study to analyze the iteration of the component design that meets a specific optimized target and geometric constraints. …”
Get full text
Conference or Workshop Item -
831
Topology optimization for custom bed-resting ankle foot orthosis
Published 2023“…The design is then optimized using a topology study to analyze the iteration of the component design that meets a specific optimized target and geometric constraints. …”
Get full text
Conference or Workshop Item -
832
Topology optimization for custom bed-resting ankle foot orthosis
Published 2023“…The design is then optimized using a topology study to analyze the iteration of the component design that meets a specific optimized target and geometric constraints. …”
Get full text
Conference or Workshop Item -
833
Design Optimization and Analysis of Radial Flux Permanent Magnet Generator Using Local Optimization Method
Published 2023“…In this paper, a Radial Flux Permanent Magnet Generator (RFPMG) configuration was examined and optimized throughout sizes and weight using the Local Optimization Method as an iterative process in order to achieve optimal output. …”
Get full text
Article -
834
Targeting the minimum water flow rate using water cascade analysis technique
Published 2004“…By eliminating the tedious iterative steps of the water surplus diagram, the WCA can quickly yield accurate minimum water targets, pinch point locations, and water allocation targets for a maximum water recovery (MWR) network, thereby offering a key complementary role to the water surplus diagram in the synthesis of water network. …”
Article -
835
Validation of lean manufacturing implementation framework using Delphi technique
Published 2012“…Lean manufacturing is a proven approach for success in manufacturing industry.However, several organisations failed in their attempt to implement lean manufacturing system The transition to lean manufacturing requires radical change which involves a total reshaping of purpose, system and culture of the organisation Therefore, a lean manufacturing implementation framework was developed This framework is Intended to provide practitioners with a better understanding of lean transition and minimize the conflicts of implementing lean manufacturing system The purpose of this paper is to validate the proposed lean manufacturing implementation framework using Delphi technique.This technique is a process of gathering opinions of experts, which designed to achieve a convergence of opinions on a specific real-world Issue The work continued over two iterative rounds until consensus or stability is reached Comments and suggestions given by the experts help to further Improve and validate the framework As conclusion,the final framework of lean manufacturing implementation is presented.…”
Get full text
Article -
836
Using ATLAS.ti 7 for researching the socio-legal implications of ICT adoption in the justice system of the High Courts of Malaysia
Published 2013“…In deriving the findings of the re search, the ATLAS.ti was used throughout the research process to manage both the secondary and primary data, properly build up the code list inductively and deductively, track the relevant quotations from time to time, explore the data using the built-in feature Query Tool, connect ideas and notes to the existing objects and visually arrange the objects to iteratively make sense of the data. Acknowledgements…”
Get full text
Conference or Workshop Item -
837
Local search manoeuvres recruitment in the bees algorithm
Published 2011“…The Bees Algorithm (BA) was created specifically by mimicking the foraging behavior of foraging bees in searching for food sources.During the searching, the original BA ignores the possibilities of the recruits being lost during the flying.The BA algorithm can become closer to the nature foraging behavior of bees by taking account of this phenomenon.This paper proposes an enhanced BA which adds a neighbourhood search parameter which we called as the Local Search Manoeuvres (LSM) recruitment factor.The parameter controls the possibilities of a bee extends its neighbourhood searching area in certain direction.The aim of LSM recruitment is to decrease the number of searching iteration in solving optimization problems that have high dimensions.The experiment results on several benchmark functions show that the BA with LSM performs better compared to the one with basic recruitment.…”
Get full text
Conference or Workshop Item -
838
Designing story card in extreme programming using machine learning technique
Published 2012“…Story card is one of the software development artifacts that can be used to gather requirements in extreme programming (XP).It can assists developers to translate and develop the system based on activities and rules stated in the story card.However, conventional XP story card framework or template is not well defined and only supports requirements in two or three sentences.It also does not states any information rather than system functionality.This may lead to conflicts, missing, and ambiguous requirements.In order to overcome this problem, Machine Learning is one of the techniques that can be used to extract the content from the list of requirements and produce the story cards based on the priority and rules of requirements.Thus, this study aims to to propose a new technique of designing story cards based on user requirements.The finding from the study is a conceptual model of designing story cards using machine learning technique.Future research will investigate how the technique adapt with the iterative changes of the requirements.…”
Get full text
Conference or Workshop Item -
839
Enhanced risk assessment equation for IPV6 deployment
Published 2015“…The importance of having the enhanced equation is it enables the network administrator to calculate the potential risks for each of the potential IPv6 attack.Securing the enterprise networks is an iterative process that has no ended points. Hence, it is crucial to modify and adapt a proper equation when performing the risk assessment.In the future, more experiments will be conducted to test for feasibility of the equation.…”
Get full text
Conference or Workshop Item -
840
A culturally-attuned distributed decision making model of global virtual teams in world summit on the information society
Published 2011“…This study analyzed the archival email messages (n= 1760 emails) from Civil Society team members in the World Summit of Information Society (WSIS) over the period of six months.The findings help to explain the way people from diverse cultural backgrounds participate in a virtual environment that’s consistent with the sequential of Adler and King don.In addition, our study also further exemplifies the dynamic and iterative process of distributed decision making among members of Civil Society.…”
Get full text
Conference or Workshop Item