Search Results - (( data selection methods algorithm ) OR ( a distribution methods algorithm ))

Refine Results
  1. 1

    Network reconfiguration and control for loss reduction using genetic algorithm by Jawad, Mohamed Hassan Izzaldeen

    Published 2010
    “…Note that the 18-bus system is originally without any capacitor. Two selection methods that are used in Genetic Algorithm are the roulette wheel and tournament selections. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Technical job distribution at BSD SHARP service center using combination of naïve Bayes and K-Nearest neighbour by Pebrianti, Dwi, Ariawan, Angga, Bayuaji, Luhur, Mahdiana, Deni, ,, Rusdah

    Published 2022
    “…The validation of the proposed method is conducted by using a confusion matrix with a composition of 80% training data and 20% test data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  3. 3

    Dynamic Robust Bootstrap Algorithm for Linear Model Selection Using Least Trimmed Squares by Uraibi, Hassan Sami

    Published 2009
    “…We modified the classical bootstrapping algorithm by developing a mechanism based on the robust LTS method to detect the correct number of outliers in the each bootstrap sample. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Extreme air pollutant data analysis using classical and Bayesian approaches by Mohd Amin, Nor Azrita

    Published 2015
    “…In general, both methods are performing well for analyzing extreme model but numerical results show that MTM method performs slightly better than MH method in terms of efficiency and convergency to the stationary distribution. …”
    Get full text
    Get full text
    Thesis
  5. 5

    An observation of different clustering algorithms and clustering evaluation criteria for a feature selection based on linear discriminant analysis by Tie, K. H., A., Senawi, Chuan, Z. L.

    Published 2022
    “…When the Gaussian mixture distribution algorithm is adopted, none of the criteria can consistently select features with the least number. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  6. 6

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Electroencephalogram-based decoding cognitive states using convolutional neural network and likelihood ratio based score fusion by Zafar, R., Dass, S.C., Malik, A.S.

    Published 2017
    “…This method showed an accuracy of 65.7. However, the proposed method predicts the novel data with improved accuracy of 79.9. …”
    Get full text
    Get full text
    Article
  8. 8

    Efficient genetic partitioning-around-medoid algorithm for clustering by Garib, Sarmad Makki Mohammed

    Published 2019
    “…Lastly, in order to externally judge the validity of these types of clustering algorithms, there is a need for a method to correctly and efficiently evaluate their variant multiclass clustering results. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Slice sampler and metropolis hastings approaches for bayesian analysis of extreme data by Rostami, Mohammad

    Published 2016
    “…A simulation study shows that the slice sampler algorithm provides posterior means with low errors for the parameters along with a high level of stationarity in iteration series. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique by Muhammad Hanafi, Yusop

    Published 2018
    “…However, this method has the difficulty in selecting the suitable IMF for the next data post-processing method, which is Hilbert Transform (HT). …”
    Get full text
    Get full text
    Thesis
  11. 11

    Parallel algorithms for numerical simulations of EHD ion-drag micropump on distributed parallel computing systems by Shakeel Ahmed, Kamboh

    Published 2014
    “…To implement the parallel algorithms a distributed parallel computing laboratory using easily available low cost computers is setup. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Depth linear discrimination-oriented feature selection method based on adaptive sine cosine algorithm for software defect prediction by Nasser, Abdullah, H.M. Ghanem, Waheed Ali, H.Y. Saad, Abdul-Malik, Hamed Abdul-Qawy, Antar Shaddad, A. Ghaleb, Sanaa A, Mohammed Alduais, Nayef Abdulwahab, Din, Fakhrud, Ghetas, Mohamed

    Published 2024
    “…To address these challenges, this research introduces a novel Depth Linear Discrimination-Oriented Feature Selection Method based on Adaptive Sine Cosine Algorithm, named Depth Adaptive Sine Cosine Feature Selection (DASC-FS). …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Monograph
  14. 14

    Hybrid performance measures and mixed evaluation method for data classification problems by Hossin, Mohammad

    Published 2012
    “…This study investigates two different issues of performance measure in data classification problem. First, this study examines the use of accuracy measure as a discriminator for building an optimized Prototype Selection (PS) algorithm. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation by Ahmadipour, Masoud

    Published 2019
    “…In order to train Ridgelet probabilistic neural network, a modified differential evolution algorithm with new mutation phase, crossover process, and selection mechanism is introduced. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Software defect prediction framework based on hybrid metaheuristic optimization methods by Wahono, Romi Satria

    Published 2015
    “…For the purpose of this study, ten classification algorithms have been selected. The selection aims at achieving a balance between established classification algorithms used in software defect prediction. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Development of Intelligent Leak Detection System Based on Artificial Pressure Transient Signal Using Integrated Kurtosis-Based Algorithm for Z-Filter Technique (I-Kaz) / Hanafi.M.Y... by M.Yusop, Hanafi, Ghazali, M.F., M.Yusof, M.F., W.Hamat, W.S.

    Published 2017
    “…However, this method has the difficulty in selecting the suitable IMF for the next data post-processing method which is Hilbert Transform (HT). …”
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Enhancing the QoS performance for mobile station over LTE and WiMAX networks / Mhd Nour Hindia by Hindia, Mhd Nour

    Published 2015
    “…Then, a multi criteria with two-threshold algorithm is proposed to prioritize the selection between the LTE and WiMAX as target technologies. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Development of priority oriented scheduling method to increase the efficiency and reliability for automotive job by Nojabaei, Seyedehfarzaneh

    Published 2012
    “…To fulfill this target, first and foremost, the normalize method should be performed. This method allows data (time stamp, time action,priority) of jobs on different scales to be compared by bringing those to a common scale. …”
    Get full text
    Get full text
    Thesis