Search Results - (( java application testing algorithm ) OR ( parametric estimation case algorithm ))

Refine Results
  1. 1

    Non-Parametric and Parametric Estimations of Cure Fraction Using Right-and Interval-Censored Data by Aljawdi, Bader

    Published 2011
    “…The major research findings were as follows: 1) the non-parametric and parametric estimation methods using the right and interval censoring types produced highly efficient cure rate parameters when the censoring rate was decreased to the minimum possible; 2) Non-parametric estimation of the cure fraction using interval censored data based on Turnbull estimator resulted in more precise cure fraction than the Kaplan Meier estimator considering the interval midpoint to represent the exact life time; 3) The parametric estimation of the cure fraction based on the exponential distribution and right and interval censoring types produced more consistent estimates than the Weibull distribution especially in case of heavy censoring; 4) Parametric estimation of the cure fraction was more efficient when some covariates had been involved in the analysis than when covariates had been excluded; and 5) the nonparametric estimation method is the viable alternative to the parametric one when the data set contains substantial censored observations while in the case of low censoring the parametric method is more attractive.…”
    Get full text
    Get full text
    Thesis
  2. 2

    System Identification of XY Table ballscrew drive using parametric and non parametric frequency domain estimation via deterministic approach by Abdullah, Lokman, Jamaludin, Zamberi, Tsung Heng, Chiew, RAFAN, NUR AIDAWATY, syed mohamed, muhammad syafiq

    Published 2012
    “…In addition, comparison of estimated model transfer function obtained via non-linear least square (NLLS) and Linear least square estimator algorithm were also being addressed. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Parametric maximum likelihood estimation of cure fraction using interval-censored data by Aljawadi, Bader Ahmad I., Abu Bakar, Mohd Rizam, Ibrahim, Noor Akma, Al-Omari, Mohamad

    Published 2013
    “…We ran the analysis using the EM algorithm considering two cases: i) when no covariates were involved in the estimation, and ii) when some covariates were involved. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5
  6. 6
  7. 7

    Parametric cure fraction models for interval-censoring with a change-point based on a covariate threshold by Ali Taweab, Fauzia

    Published 2015
    “…The proposed model has sound motivation in relapse of cancer and can be used in other disease models. The parametric maximum likelihood estimation method is employed to verify the performance of the MCM within the framework of the expectation-maximization (EM) algorithm while the estimation methods for other models are employed in a simpler and straightforward setting. …”
    Get full text
    Get full text
    Thesis
  8. 8

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    Parameter estimation of the cure fraction based on BCH model using left-censored data with covariates. by I. Aljawadi, Bader Ahnad, Abu Bakar, Mohd Rizam, Ibrahim, Noor Akma, Midi, Habshah

    Published 2011
    “…The analysis is constructed by means of the exponential distribution in the case of left censoring and within the framework of the expectation maximization (EM) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  11. 11

    Parametric and Semiparametric Competing Risks Models for Statistical Process Control with Reliability Analysis by Mohamed Elfaki, Faiz Ahmed

    Published 2004
    “…The Expectation Maximization (EM) algorithm is utilized to obtain the estimate of the parameters in the models. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Field data-based mathematical modeling by Bode equations and vector fitting algorithm for renewable energy applications by Sabry, Ahmad H., Wan Hasan, Wan Zuha, Ab Kadir, M. Zainal A., Mohd Radzi, Mohd Amran, Shafie, Suhaidi

    Published 2018
    “…This paper proposes a new modified methodology presented as a parametric technique to determine the system’s modeling equations based on the Bode plot equations and the vector fitting (VF) algorithm by fitting the experimental data points. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Lightning peak current estimation using a system identification approach by Wern T.L.T., Mukerjee R.N.

    Published 2023
    “…A system identification-based lightning peak current estimation algorithm using upper-air radiosonde observations is developed. …”
    Article
  14. 14
  15. 15

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  16. 16
  17. 17

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
    Get full text
    Get full text
    Student Project