Search Results - (( data normalization _ algorithm ) OR ( parameter simulation based algorithm ))

Refine Results
  1. 1

    Confidence intervals (CI) for concentration parameter in von Mises distribution and analysis of missing values for circular data / Siti Fatimah binti Hassan by Hassan, Siti Fatimah

    Published 2015
    “…For example, the distribution analogues to the normal distribution in linear data is known as circular normal distribution. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Multi-Objective Hybrid Algorithm For The Classification Of Imbalanced Datasets by Saeed, Sana

    Published 2019
    “…For its fast convergence and for its efficient search procedure, the self-adaptation is proposed in the parameters of the proposed hybrid algorithm. The effectiveness of this algorithm is verified by applying it on the unconstrained and constrained test functions through a simulation study. …”
    Get full text
    Get full text
    Thesis
  3. 3

    An enhanced cluster head selection algorithm for routing in mobile AD-HOC network by Abdulsaheb, Ghaida Muttasher

    Published 2017
    “…The performance of ECRP algorithms was compared with other cluster based algorithms. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Application of Evolutionary Algorithm for Assisted History Matching by Zahari, Muhammad Izzat

    Published 2014
    “…While the automatic method focus on optimization which is normally computer based. In this project, we will define and discuss the application of evolutionary algorithm in assisted history matching. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    Dynamic robust bootstrap method based on LTS estimators by Midi, Habshah, Uraibi, Hassan Sami, Al-Talib, Bashar Abdul Aziz Majeed

    Published 2009
    “…In order to make reliable inferences about the parameters of a model, require that the parameter estimates are normally distributed. …”
    Get full text
    Get full text
    Article
  6. 6

    Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah by Abdullah, Mohd Azrul

    Published 2015
    “…Two important Weibull parameters which are shape and scale are measured. Based on the identified statistical parameters, a new Time Based Policing and Shaping algorithm is developed and simulated. …”
    Get full text
    Get full text
    Article
  7. 7

    Dynamic Robust Bootstrap Algorithm for Linear Model Selection Using Least Trimmed Squares by Uraibi, Hassan Sami

    Published 2009
    “…To rectify this problem, we propose a Dynamic Robust Bootstrap-LTS based (DRBLTS) algorithm where the percentage of outliers in each bootstrap sample is detected. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah by Abdullah, Mohd Azrul

    Published 2015
    “…Two important Weibull parameters which are shape and scale are measured. Based on the identified statistical parameters, a new Time Based Policing and Shaping algorithm is developed and simulated. …”
    Get full text
    Get full text
    Thesis
  9. 9

    The comparison of tardiness in scheduling techniques for task distribution using grid simulation tool by Stapa @ Mustapa, Muhamad Azhar

    Published 2008
    “…The goal of this project is to test on tardiness parameter in local search based algorithms. A good scheduling algorithm normally shows lower value of total tardiness and schedule time. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Reduced rank technique for joint channel estimation and joint data detection in TD-SCDMA systems by Marzook, Ali Kamil, Ismail, Alyani, Mohd Ali, Borhanuddin, Sali, Aduwati, Khalaf, Mohannad H., Khatun, Sabira

    Published 2013
    “…We exploit the rank deficient of H to reduce the number of parameters that characterizes this matrix. The adopted reduced rank technique is based on singular value decomposition algorithm. …”
    Get full text
    Get full text
    Article
  11. 11

    Reduced-rank technique for joint channel estimation in TD-SCDMA systems. by Ismail, Alyani, Sali, Aduwati, Mohd Ali, Borhanuddin, Khatun, Sabira

    Published 2013
    “…We exploit the rank deficient of H to reduce the number of parameters that characterizes this matrix. The adopted reduced rank technique is based on singular value decomposition algorithm. …”
    Get full text
    Get full text
    Article
  12. 12

    Reduced Rank Technique for Joint Channel Estimation and Joint Data Detection in TD-SCDMA Systems by Sabira, Khatun, Ali K., Marzook, Alyani, Ismail, Aduwati, Sali, Mohannad Hamed, Khalaf, Borhan, M. Ali

    Published 2012
    “…We exploit the rank deficient of H to reduce the number of parameters that characterizes this matrix. The adopted reduced rank technique is based on singular value decomposition algorithm. …”
    Get full text
    Get full text
    Article
  13. 13

    Taguchi's method for optimized neural network based autoreclosure in extra high voltage lines by K.S.R., Rao, Z.F., Desta

    Published 2008
    “…The developed algorithm is verified with dedicated testing data. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Performance enhancement of adaptive cluster formation and routing protocols in wireless networks by Khalaf, Osamah Ibrahem

    Published 2017
    “…The simulation results have shown that these algorithms can increase the throughput and packet delivery ratio. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Statistical performance of agglomerative hierarchical clustering technique via pairing of correlation-based distances and linkage methods by Nurshaziana, Mohamad Shamsuri

    Published 2025
    “…To validate the clustering model on real data, the Spearman-average algorithm was applied to cluster Juru river basin data based on five water quality parameters. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff by Mohd Yusoff, Mohd Izhan

    Published 2014
    “…The new algorithm is tested on simulated and real data where the results show it is capable of detecting fraud activities. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network by Abu-Khadrah, Ahmed Ismail Mohammad

    Published 2017
    “…Through the proposed algorithm, the Minimum Contention Window (CWmin) and Arbitration Inter Frame Space (AIFS) parameters were adapted based on the percentage of the collision in the network. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Modified least trimmed squares method for face recognition / Nur Azimah Abdul Rahim by Abdul Rahim, Nur Azimah

    Published 2018
    “…The genetic algorithm configuration for n (number of observations) and p (parameter) was changed to assess the performance of modified method. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Removal of BCG artefact from concurrent fMRI-EEG recordings based on EMD and PCA by Javed, E., Faye, I., Malik, A.S., Abdullah, J.M.

    Published 2017
    “…Results The method was tested with both simulated and real EEG data of 11 participants. From the simulated data, the similarity index between the extracted BCG and the simulated BCG showed the effectiveness of the proposed method in BCG removal. …”
    Get full text
    Get full text
    Article
  20. 20

    Optimization and control of hydro generation scheduling using hybrid firefly algorithm and particle swarm optimization techniques by Hammid, Ali Thaeer

    Published 2018
    “…To deal with these problems, this thesis introduces three approved intelligent controllers for hydropower generation. Firstly, a hybrid algorithm namely firefly particle swarm optimization (FPSO) and series division method (SDM) based on the practical swarm optimization and the firefly algorithm is proposed. …”
    Get full text
    Get full text
    Thesis