Search Results - (( parameter evaluation method algorithm ) OR ( data distribution some algorithm ))

Refine Results
  1. 1
  2. 2

    Dynamic robust bootstrap method based on LTS estimators by Midi, Habshah, Uraibi, Hassan Sami, Al-Talib, Bashar Abdul Aziz Majeed

    Published 2009
    “…The performance of the DRBLTS is evaluated by real data sets and simulation study. The numerical examples indicate that the DRBLTS is more efficient than the other methods.…”
    Get full text
    Get full text
    Article
  3. 3

    Non-Parametric and Parametric Estimations of Cure Fraction Using Right-and Interval-Censored Data by Aljawdi, Bader

    Published 2011
    “…In this thesis, we considered two methods via the expectation maximization (EM) algorithm for cure rate estimation based on the BCH model using the two censoring types common to cancer clinical trials; namely, right and interval censoring. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Instance matching framework for heterogeneous semantic web content over linked data environment by Mansir, Abubakar

    Published 2021
    “…The output of each algorithm is evaluated, the results have shown that each algorithm performs well and outperforms the existing algorithms on all test cases in terms better output generation and effective handling of heterogeneity from different domains, which is a necessary concern in all data-intensive problems. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Numerical methods for solving temperature and mass transfer simulation on dehydration process of tropical fruits by Alias, Norma, Che Teh, Che Rahim, Berahim, Mazniha, Abdul Ghaffar, Zarith Safiza, Islam, Md. Rajibul, Hamzah, Norhafizah

    Published 2009
    “…This paper aims to illustrate the simulation of tropical fruits’ dehydration through some numerical methods such as Jacobi, Gauss-Seidel and Red-Black Gauss-Seidel. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Dynamic replication algorithm in data grid: Survey by K. Madi, Mohammed, Hassan, Suhaidi

    Published 2008
    “…Data replication is a common method used to improve the performance of data access in distributed systems. …”
    Get full text
    Get full text
    Get full text
    Book Section
  7. 7
  8. 8

    Taguchi-Grey Relational Analysis Method for Parameter Tuning of Multi-objective Pareto Ant Colony System Algorithm by Muthana, Shatha Abdulhadi, Ku Mahamud, Ku Ruhana

    Published 2023
    “…The gray relational grade (GRG) performance metric and the Friedman test were used to evaluate the algorithm’s performance. The Taguchi-GRA method that produced the new values for the algorithm’s parameters was shown to be able to provide a better multi-objective generator maintenance scheduling (GMS) solution. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Evaluation of lightning current parameters using measured lightning induced voltage on distribution power lines by Izadi, Mahdi, Ab Kadir, Mohd Zainal Abidin, Osman, Miszaina

    Published 2019
    “…In this paper, an algorithm had been proposed to evaluate the lightning current parameters using measured voltage from overhead distribution lines based on lightning location obtained from lightning location system. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Inversed Control Parameter in Whale Optimization Algorithm and Grey Wolf Optimizer for Wrapper-Based Feature Selection: A Comparative Study by Li Yu Yab, Li Yu Yab, Wahid, Noorhaniza, A Hamid, Rahayu

    Published 2023
    “…This comparative study aims to investigate and compare the effectiveness of the inversed control parameter in the proposed methods against the original algorithms in terms of the number of selected features and the classification accuracy. …”
    Get full text
    Get full text
    Article
  11. 11

    Inversed Control Parameter in Whale Optimization Algorithm and Grey Wolf Optimizer for Wrapper-Based Feature Selection: A Comparative Study by Li Yu Yab, Li Yu Yab, Wahid, Noorhaniza, A Hamid, Rahayu

    Published 2023
    “…This comparative study aims to investigate and compare the effectiveness of the inversed control parameter in the proposed methods against the original algorithms in terms of the number of selected features and the classification accuracy. …”
    Get full text
    Get full text
    Article
  12. 12

    Evaluation of Lightning Current Using Inverse Procedure Algorithm. by Ab Kadir, Mohd Zainal Abidin, Izadi, Mahdi, Askari, Mohamad Tolou, Hajikhani, Maryam

    Published 2013
    “…The proposed method considers on all electromagnetic fields components and can evaluate full shape of current, velocity and constant parameters of current models in contrast with previous studies. …”
    Get full text
    Get full text
    Article
  13. 13

    Some families of count distributions for modelling zero-inflation and dispersion / Low Yeh Ching by Low, Yeh Ching

    Published 2016
    “…A popular distribution for the modelling of discrete count data is the Poisson distribution. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Tree-based contrast subspace mining method by Florence Sia Fui Sze

    Published 2020
    “…Then, the tree-based method, the genetic algorithm based parameter values identification of tree-based method, and followed by the genetic algorithm based tree-based method, for numerical data sets are developed and evaluated. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Evaluating power efficient algorithms for efficiency and carbon emissions in cloud data centers: a review by Uddin, Mueen, Darabidarabkhani, Yasaman, Shah, Asadullah, Memon, Jamshed

    Published 2015
    “…The three algorithms are evaluated for performance using three parameters; power efficiency, cost effectiveness, and amount of CO2 emissions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Performance evaluation of symmetric cryptography algorithm for database system / Mariam Azwa Yazid by Yazid, Mariam Azwa

    Published 2015
    “…Cryptography has been proven to be the best method to secure a database. However there are many types of cryptography algorithm that has been established in the market. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Parameters optimization of surface grinding process with particles swarm optimization, gravitational search, and sine cosine algorithms: a comparative analysis by Asrul, Adam

    Published 2018
    “…The efficiency of the three algorithms are evaluated and compared with previous results obtained by other optimization methods on similar studies. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…The fourth stage is to design evaluation methodology of Max-Min Rule-Based Classification Algorithm using classifier model. …”
    Get full text
    Get full text
    Thesis