Search Results - (( data iteration method algorithm ) OR ( using codification based algorithm ))

Refine Results
  1. 1

    Multiple equations model selection algorithm with iterative estimation method by Kamarudin, Nur Azulia, Ismail, Suzilah

    Published 2016
    “…Meanwhile, real data analysis using water quality index displays excellent accomplishments when compared to other selection procedures.Consequently, iterative feasible generalized least squares method is regarded as a more suitable estimation method in this automated selection.It can also be seen that simultaneous selections outperform the individual selections.This strategy by executing simultaneous selection with iterative estimation method is therefore proven to outclass in this analysis.…”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    VLSI floor planning optimization using genetic algorithm and cross entropy method / Angeline Teoh Szu Fern by Angeline Teoh, Szu Fern

    Published 2012
    “…This method is used to reduce the stochastic of data generation as the second iteration will have influence of the first iteration data. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Semiparametric inference procedure for the accelarated failure time model with interval-censored data by Karimi, Mostafa

    Published 2019
    “…The main contribution of this research is developing statistical approaches, and introducing new algorithms and resampling methods for analysing interval-censored data through AFT models.…”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    DESIGN AND IMPLEMENTATION OF RIPEMD-160 HASH FUNCTION USING VERILOG HDL by Sharifah Azizah, Wan Alwi

    Published 2022
    “…This project proposes to design an iterative method of RIPEMD-160 in order to investigate the security algorithm and its implementation. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  6. 6

    Repetitive mutations in genetic algorithm for software test data generations by Kadhim, Mohammed Majid

    Published 2022
    “…One of the white box testing techniques is path coverage testing. Genetic Algorithm (GA) has proven to be an important method in generating test data for automatic path coverage testing. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Improved stochastic gradient descent algorithm with mean-gradient adaptive stepsize for solving large-scale optimization problems by Zulkifli, Munierah, Abd Rahmin, Nor Aliza, Wah, June Leong

    Published 2023
    “…It is an iterative algorithm with descent properties that reduces computational cost by using derivatives of random data points. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Iterative And Single-Step Solutions Of Two Dimensional Time-Domain Inverse Scattering Problem Featuring Ultra Wide Band Sensors by Binajjaj, Saeed Ali Saeed

    Published 2010
    “…The imaging algorithm was based on a non-linear optimization technique from which the single-step and iterative inversion schemes were realized. …”
    Get full text
    Get full text
    Thesis
  11. 11

    DESIGN AND IMPLEMENTATION OF RIPEMD-160 ALGORITHM ON RECONFIGURABLE HARDWARE by FLORISCA, ALDINA GODULUS

    Published 2019
    “…This project used iterative method to investigate the security algorithm and implemented the algorithm. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  12. 12
  13. 13

    The Development of an Algorithm to Determine Axial Capacity of Piles from SPT N-Values by Ambrose, Jasmin

    Published 2000
    “…For capacity prediction in sand, comparison of results using other methods (Davisson and Chin's formulae) were selected and recalibrated according to the iterative technique (IT). …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Application of Evolutionary Algorithm for Assisted History Matching by Zahari, Muhammad Izzat

    Published 2014
    “…When the differences between the observed performance data and simulated data are found, the iterations are made to modify the accuracy of the match. …”
    Get full text
    Get full text
    Final Year Project
  16. 16

    Extended multiple models selection algorithms based on iterative feasible generalized least squares (IFGLS) and expectation-maximization (EM) algorithm by Nur Azulia, Kamarudin

    Published 2019
    “…Therefore, in this study SUREAutometrics is improvised using two MLE methods, which are iterative feasible generalized least squares (IFGLS) and expectation-maximization (EM) algorithm, named as SURE(IFGLS)-Autometrics and SURE(EM)-Autometrics algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Characterization of PV panel and global optimization of its model parameters using genetic algorithm by Ismail M.S., Moghavvemi M., Mahlia T.M.I.

    Published 2023
    “…The global optimization of the parameters and the applicability for the entire range of the solar radiation and a wide range of temperatures are achievable via this approach. The Manufacturer's Data Sheet information is used as a basis for the purpose of parameter optimization, with an average absolute error fitness function formulated; and a numerical iterative method used to solve the voltage-current relation of the PV module. …”
    Article
  18. 18

    Logistic regression methods for classification of imbalanced data sets by Santi Puteri Rahayu, -

    Published 2012
    “…These results can be seen as further explanation on the success of Truncated Newton method in TR-KLR and TR Iteratively Re-weighted Least Square (TR-IRLS) algorithm respectively, because of the equivalence of iterative method used by these algorithms. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Enhancement of network security by use machine learning by Hasan, Ahmed Raheem

    Published 2019
    “…The time taken to reach the accuracy is also short with less number of iteration. The ANNDL uses iterations method to detect the data, do matching and identify the data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis