Showing 821 - 840 results of 1,490 for search '"ITER"', query time: 0.05s Refine Results
  1. 821

    Diagonal quasi-Newton updating formula using log-determinant norm by Sim, Hong Seng, Leong, Wah June, Chen, Chuei Yee, Ibrahim, Siti Nur Iqmal

    Published 2015
    “…The popularity of this method is due to the fact that only the gradient of the objective function is required at each iterate. Since second derivatives (Hessian) are not required, quasi-Newton method is sometimes more efficient than the Newton method, especially when the computation of Hessian is expensive. …”
    Get full text
    Conference or Workshop Item
  2. 822

    Block method with Hermite interpolation for numerical solution of delay differential equations by Ishak, Fuziyah, Abdul Majid, Zanariah, Suleiman, Mohamed

    Published 2012
    “…The implicit method is solved using predictor-corrector scheme where the corrector is iterated until convergence. Grid point formulae are derived using a predictor and a corrector of order five. …”
    Get full text
    Conference or Workshop Item
  3. 823

    A low complexity high efficiency hybrid multiplicative-additive crest factor reduction for OFDM systems by Al-Hussaini, Khalid, Mohd Ali, Borhanuddin, Varahram, Pooria, Hashim, Shaiful Jahari, Farrell, Ronan

    Published 2017
    “…Then, a new optimization scheme is introduced, in which only a single two-phase sequence and four iterations need to be applied. Numerical analysis shows that the proposed hybrid technique achieves better CF reduction performance with significantly lower complexity and better bit error rate performance than the existing scrambling (multiplicative) and additive CF techniques.…”
    Get full text
    Article
  4. 824

    User-driven design of decision support systems for polycentric environmental resources management by Zulkafli, Zed, Perez, Katya, Vitolo, Claudia, Buytaert, Wouter, Karpouzoglou, Timothy, Dewulf, Art, Bièvre, Bert De, Clark, Julian, Hannah, David M., Shaheed, Simrita

    Published 2017
    “…To address these issues, we present a participatory framework for designing EDSS that emphasizes a more complete understanding of the decision making structures and iterative design of the user interface. We illustrate the application of the framework through a case study within the context of water-stressed upstream/downstream communities in Lima, Peru.…”
    Get full text
    Article
  5. 825

    Using IT/ICT as a new medium toward implementation of interactive architectural communication cultures by Rahimian, Farzad Pour, Ibrahim, Rahinah, Baharuddin, Mohd Nasir

    Published 2008
    “…Design is a multi-aspect, iterative, and complicated exclusive human activity and a critical aspect of many modern industries. …”
    Get full text
    Conference or Workshop Item
  6. 826

    Ontology development life cycle: a review by Mohd Rum, Siti Nurulain, Affendey, Lilly Suriani, Yaakob, Razali

    Published 2019
    “…Some methodologies followan iterative development life cycle and some are not.Their application in real project is comparatively limited despites of their growing number. …”
    Get full text
    Article
  7. 827

    Urban transit frequency setting using Multiple Tabu Search with parameter control by Uvaraja, Vikneswary, Lee, Lai Soon

    Published 2019
    “…The chosen parameter gives considerable effect on the objective functions compared to other parameters such as the size of tabu list and the number of iterations. Using statistical hypotheses evaluation, the results indicate that the number of domains determines the quality of solutions for different instances of the problem. …”
    Get full text
    Article
  8. 828

    Vector least-squares solutions for coupled singular matrix equations by Kilicman, Adem, Abdel Aziz Al Zhour, Zeyad

    Published 2007
    “…Finally, we recover the iterative methods to the weighted case in order to obtain the minimum D-norm G-vector least-squares solutions for the coupled Sylvester matrix equations and the results lead to the least-squares solutions and invertible solutions, as a special case. © 2006 Elsevier B.V. …”
    Get full text
    Article
  9. 829

    Direct integration of the third-order two point and multipoint Robin type boundary value problems by Mohd Nasir, Nadirah, Abdul Majid, Zanariah, Ismail, Fudziah, Bachok @ Lati, Norfifah

    Published 2021
    “…Instead, its implementation involved the use of shooting technique, which included the Newton divided difference formula employed for the iterative part, for the estimation of the initial guess. …”
    Get full text
    Article
  10. 830

    Topology optimization for custom bed-resting ankle foot orthosis by Ab Rashid, Amir Mustakim, Md Nazid, Effi Zuhairah, Mazlan, Muhammad Hazli, Pangesty, Azizah Intan, Abdullah, Abdul Halim

    Published 2024
    “…The design is then optimized using a topology study to analyze the iteration of the component design that meets a specific optimized target and geometric constraints. …”
    Get full text
    Conference or Workshop Item
  11. 831

    Topology optimization for custom bed-resting ankle foot orthosis by Ab Rashid, Amir Mustakim, Md Nazid, Effi Zuhairah, Mazlan, Muhammad Hazli, Pangesty, Azizah Intan, Abdullah, Abdul Halim

    Published 2023
    “…The design is then optimized using a topology study to analyze the iteration of the component design that meets a specific optimized target and geometric constraints. …”
    Get full text
    Conference or Workshop Item
  12. 832

    Topology optimization for custom bed-resting ankle foot orthosis by Ab Rashid, Amir Mustakim, Md Nazid, Effi Zuhairah, Mazlan, Muhammad Hazli, Pangesty, Azizah Intan, Abdullah, Abdul Halim

    Published 2023
    “…The design is then optimized using a topology study to analyze the iteration of the component design that meets a specific optimized target and geometric constraints. …”
    Get full text
    Conference or Workshop Item
  13. 833

    Design Optimization and Analysis of Radial Flux Permanent Magnet Generator Using Local Optimization Method by Mostaman, Nur Afiqah, Sulaiman, Erwan, Jenal, Mahyuzie

    Published 2023
    “…In this paper, a Radial Flux Permanent Magnet Generator (RFPMG) configuration was examined and optimized throughout sizes and weight using the Local Optimization Method as an iterative process in order to achieve optimal output. …”
    Get full text
    Article
  14. 834

    Targeting the minimum water flow rate using water cascade analysis technique by Abdul Manan, Zainuddin, Yin, Ling Tan, Chwan, Dominic Yee Foo

    Published 2004
    “…By eliminating the tedious iterative steps of the water surplus diagram, the WCA can quickly yield accurate minimum water targets, pinch point locations, and water allocation targets for a maximum water recovery (MWR) network, thereby offering a key complementary role to the water surplus diagram in the synthesis of water network. …”
    Article
  15. 835

    Validation of lean manufacturing implementation framework using Delphi technique by Nordin, Norani, Md Deros, Baba, Abdul Wahab, Dzuraidah, Ab. Rahman, Mohd Nizam

    Published 2012
    “…Lean manufacturing is a proven approach for success in manufacturing industry.However, several organisations failed in their attempt to implement lean manufacturing system The transition to lean manufacturing requires radical change which involves a total reshaping of purpose, system and culture of the organisation Therefore, a lean manufacturing implementation framework was developed This framework is Intended to provide practitioners with a better understanding of lean transition and minimize the conflicts of implementing lean manufacturing system The purpose of this paper is to validate the proposed lean manufacturing implementation framework using Delphi technique.This technique is a process of gathering opinions of experts, which designed to achieve a convergence of opinions on a specific real-world Issue The work continued over two iterative rounds until consensus or stability is reached Comments and suggestions given by the experts help to further Improve and validate the framework As conclusion,the final framework of lean manufacturing implementation is presented.…”
    Get full text
    Article
  16. 836

    Using ATLAS.ti 7 for researching the socio-legal implications of ICT adoption in the justice system of the High Courts of Malaysia by Mohamad, Ani Munirah

    Published 2013
    “…In deriving the findings of the re­ search, the ATLAS.ti was used throughout the research process to manage both the secondary and primary data, properly build up the code list inductively and deductively, track the relevant quotations from time to time, explore the data using the built-in feature Query Tool, connect ideas and notes to the existing objects and visually arrange the objects to iteratively make sense of the data. Acknowledgements…”
    Get full text
    Conference or Workshop Item
  17. 837

    Local search manoeuvres recruitment in the bees algorithm by Muhamad, Zaidi, Mahmuddin, Massudi, Nasrudin, Mohammad Faidzul, Sahran, Shahnorbanun

    Published 2011
    “…The Bees Algorithm (BA) was created specifically by mimicking the foraging behavior of foraging bees in searching for food sources.During the searching, the original BA ignores the possibilities of the recruits being lost during the flying.The BA algorithm can become closer to the nature foraging behavior of bees by taking account of this phenomenon.This paper proposes an enhanced BA which adds a neighbourhood search parameter which we called as the Local Search Manoeuvres (LSM) recruitment factor.The parameter controls the possibilities of a bee extends its neighbourhood searching area in certain direction.The aim of LSM recruitment is to decrease the number of searching iteration in solving optimization problems that have high dimensions.The experiment results on several benchmark functions show that the BA with LSM performs better compared to the one with basic recruitment.…”
    Get full text
    Conference or Workshop Item
  18. 838

    Designing story card in extreme programming using machine learning technique by Yasin, Azman, Gaber, Shamsan, Omar, Mazni, Mohd, Haslina, Baharom, Fauziah, Md Din, Marina

    Published 2012
    “…Story card is one of the software development artifacts that can be used to gather requirements in extreme programming (XP).It can assists developers to translate and develop the system based on activities and rules stated in the story card.However, conventional XP story card framework or template is not well defined and only supports requirements in two or three sentences.It also does not states any information rather than system functionality.This may lead to conflicts, missing, and ambiguous requirements.In order to overcome this problem, Machine Learning is one of the techniques that can be used to extract the content from the list of requirements and produce the story cards based on the priority and rules of requirements.Thus, this study aims to to propose a new technique of designing story cards based on user requirements.The finding from the study is a conceptual model of designing story cards using machine learning technique.Future research will investigate how the technique adapt with the iterative changes of the requirements.…”
    Get full text
    Conference or Workshop Item
  19. 839

    Enhanced risk assessment equation for IPV6 deployment by Rosli, Athirah, Mat Taib, Abidah, Baharin, Hanif, Wan Ali, Wan Nor Ashiqin, Hamid, Ros Syamsul

    Published 2015
    “…The importance of having the enhanced equation is it enables the network administrator to calculate the potential risks for each of the potential IPv6 attack.Securing the enterprise networks is an iterative process that has no ended points. Hence, it is crucial to modify and adapt a proper equation when performing the risk assessment.In the future, more experiments will be conducted to test for feasibility of the equation.…”
    Get full text
    Conference or Workshop Item
  20. 840

    A culturally-attuned distributed decision making model of global virtual teams in world summit on the information society by Zakaria, Norhayati, Cogburn, Derrick L.

    Published 2011
    “…This study analyzed the archival email messages (n= 1760 emails) from Civil Society team members in the World Summit of Information Society (WSIS) over the period of six months.The findings help to explain the way people from diverse cultural backgrounds participate in a virtual environment that’s consistent with the sequential of Adler and King don.In addition, our study also further exemplifies the dynamic and iterative process of distributed decision making among members of Civil Society.…”
    Get full text
    Conference or Workshop Item