753 results found.
Year: 2018, Volume: 18, Number: 3
... purpose Lattice Boltzmann code Computationally most intensive parts of the algorithm are that runs on commodity computer with multiple heterogeneous ... to parallelize parts of algorithm on two or more parallel algorithms. heterogeneous devices). Binding between host ( ... layout are also proposed. to parallel code and expose algorithmic parallelism. Most Implementation is tested on a one-node ...
Terms matched: 3 - Score: 30 - 1,169k
Year: 2019, Volume: 19, Number: 1
... same performance as that of the zero-forcing (ZF) algorithm technique, it could be possible to separate spatially ... particle swarm optimization 2017. doi:10.1109/TVT.2016.2624801 algorithms in cooperative wireless communications," Optimization [25 ... . Jindal, "High SNR Analysis for MIMO broadcast Algorithms-Methods and Applications, InTech, 2016, pp. ...
Terms matched: 3 - Score: 27 - 730k
Year: 2009, Volume: 9, Issue: 3
... possible to increase the precision of the that: mathematical algorithm in the classical controllers with 1. Classical controllers ... their flexibility and simplicity of the fuzzy linguistic formalism. algorithms are easier. Several works in the literature study ... floue, des réseaux de neurones et des APPENDIX A algorithmes génétiques", Thèse de Doctorat. 1999, ...
Terms matched: 3 - Score: 14 - 290k
Year: 2008, Volume: 8, Issue: 2
... the highest of which form sets of maximally generalized and Algorithm of network operation is universal and means various characters-signals ... the fact that in complete basic transformation are applied in algorithms of parallel- network [11], more ... 1981. – 131p. [1] Introduction to algorithmic theory of hierarchy and parallelism of [16] ...
Terms matched: 3 - Score: 10 - 480k
Year: 2018, Volume: 18, Number: 3
... been While cryptography and secret sharing extend far back to proposed as a new steganography algorithm. It is based on two ancient history, watermarking and steganography are basic ... attack must be considered as watermarking, and steganography. characteristics of the image steganography algorithms. In this study, Improved Chaos Based Bit Embedding has been While cryptography ...
Terms matched: 2 - Score: 456 - 1,261k
Year: 2014, Volume: 14, Number: 3
... proposed in the literature. The comparison of comparison results show that P&O algorithm is very the MPPT algorithms in literature are made by a sun simulator competitive ... Volume 14, Number 3, 2014 Performance Comparison of Widely-Used Maximum Power Point Tracker Algorithms under Real Environmental Conditions Ali DURUSU, Ismail NAKIR, Ali AJDER, Ramazan ...
Terms matched: 2 - Score: 363 - 968k
Year: 2017, Volume: 17, Number: 4
... of the classical k-means clustering paper presents an improved clustering approach, based on the algorithm. Section III discusses some of the related work classical k-means algorithm, and ... new The rest of this paper is organized as follows: Section II versions of algorithms were created recently, but the existing algorithms were improved and even optimized as ...
Terms matched: 2 - Score: 347 - 1,175k
Year: 2013, Volume: 13, Number: 2
... In this performed of three well-known evolutionary algorithms which respect, the robustness of the algorithm for the fixed control are Particle Swarm Optimization (PSO) algorithm, Differential ... and Computer Engineering Volume 13, Number 2, 2013 Comparing the Robustness of Evolutionary Algorithms on the Basis of Benchmark Functions Ezgi DENİZ ÜLKER, Ali HAYDAR Girne American ...
Terms matched: 2 - Score: 332 - 686k
Year: 2018, Volume: 18, Number: 3
... Computer Engineering Volume 18, Number 3, 2018 A Hybrid Model based on Genetic Algorithm and Space-Filling Curve applied to Optimization of Vehicle Routes Warley Rocha MENDES1, Flávio ... Therefore, very large validity of the hybrid algorithm by performing tests in two runtime algorithms (such as optimal solution) cannot be different benchmarks datasets. Our proposal ...
Terms matched: 2 - Score: 275 - 1,759k
Year: 2018, Volume: 18, Number: 1
... heuristic conventional light microscopy [3]. It is approximately algorithms such as Firefly Algorithm, Particle Swarm needed to examine at least 100 fields and spend five minutes ... 1, 2018 A Novel Approach for Bi-Level Segmentation of Tuberculosis Bacilli Based on Meta-Heuristic Algorithms Selen AYAS1, Hulya DOGAN1, Eyup GEDIKLI2, Murat EKINCI1 1 Computer Engineering ...
Terms matched: 2 - Score: 261 - 1,375k