Search Results - (( probable distribution modified algorithm ) OR ( parallel estimation based algorithm ))
Search alternatives:
- probable distribution »
- distribution modified »
- parallel estimation »
- estimation based »
-
1
A parallel genetic algorithm-based TSK-Fuzzy system for dynamic car-following modeling
Published 2009“…This paper presents the application of Parallel Genetic Algorithm (PGA)-based Takagi Sugeno Kang (TSK)-Fuzzy approach for dynamic car-following modeling in the traffic simulation software. …”
Get full text
Get full text
Article -
2
Winsorize tree algorithm for handling outliers in classification problem
Published 2016“…This study proposes a modified classification tree algorithm called Winsorize tree based on the distribution of classes in the training dataset. …”
Get full text
Get full text
Get full text
Thesis -
3
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…Additionally, the traffic are relying on the markers and scheduling algorithms to the service classes at the routers. The higher level priority agreements give a higher or equal probability than the lower level, this technique is perfect at a core router by scheduling algorithm. …”
Get full text
Get full text
Thesis -
4
New algorithm for gyroless spacecraft angular rate Estimation and its application
Published 2006“…A new algorithm for estimating the angular velocity using quaternion measurements is developed based on the concept of the global optimality resulting when using a centralized or master Kalman filter. …”
Get full text
Get full text
Article -
5
-
6
A bit-serial sum of absolute difference accelerator for variable block size motion estimation of H.264
Published 2009“…In this paper, we propose the first least significant bit (LSB) bit-serial sum of absolute difference (SAD) hardware accelerator for integer variable block size motion estimation (VBSME) of H.264. This hardware accelerator is based on a previous state-of-art bit-parallel architecture namely propagate partial SAD. …”
Get full text
Get full text
Conference or Workshop Item -
7
Stochastic And Modified Sequent Peak Algorithm For Reservoir Planning Analysis Considering Performance Indices
Published 2016“…The tests are implemented for testing consistency, stationarity, randomness and determining the most appropriate probability distribution function of the historical data. …”
Get full text
Get full text
Thesis -
8
Resource Minimization in a Real-time Depth-map Processing System on FPGA
Published 2011“…Depth-map algorithm allows camera system to estimate depth. It is a computational intensive algorithm, but can be implemented with high speed on hardware due to the parallelism property. …”
Get full text
Get full text
Conference or Workshop Item -
9
Conjunctions in biological neural architectures for visual pose estimation / Tom´As Maul
Published 2006“…A highly parallel approach based on simple inter-map conjunctions, or correspondence distributions, is chosen and tested on synthetic and real patterns. …”
Get full text
Get full text
Thesis -
10
Parameter estimation of Kumaraswamy Burr type X models based on cure models with or without covariates
Published 2017“…Kumaraswamy distribution has a closed form of probability density function (PDF) and CDF, which makes it tractable. …”
Get full text
Get full text
Thesis -
11
An improvement on the valiantbrebner hypercube data broadcasting technique / Nasaruddin Zenon
Published 1990“…In section 1.0 a description of the hypercube topological characteristics will be given which can be used to modify the algorithm. Section 2.0 provides the description of the Valiant and Brebner (V-B) algorithm. …”
Get full text
Get full text
Article -
12
-
13
Algorithm optimization and low cost bit-serial architecture design for integer-pixel and sub-pixel motion estimation in H.264/AVC / Mohammad Reza Hosseiny Fatemi
Published 2012“…This thesis is concerned with algorithm optimization and efficient low cost architecture design for integer motion estimation (IME) and sub-pixel motion estimation (SME) of H.264/AVC. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Investigation of QAM based on mean square error (MSE) channel estimation (CE) for MIMO-OFDM pilot based system / Mohd Ariff Ibrahim
Published 2013“…The diversity in MIMO-OFDM is based on the lowest Bit Error Rate (BER) of each result by the estimation of Quadrature Amplitude Modulation (QAM) scheme size. …”
Get full text
Get full text
Thesis -
15
Under-reach correction in twin circuits without residual current input from the parallel line
Published 2008“…The paper develops characteristic expressions for effective sequence impedances of twin circuit lines and presents a non-iterative microprocessor based algorithm for fault distance and under-reach estimation in real time, for under-reach correction in basic distance relaying scheme. …”
Get full text
Get full text
Get full text
Article -
16
Customised fitness function of evolutionary algorithm for optimization of car park space / Ahmad Syahir Ab. Aziz
Published 2017“…Parking space are designed based on the three type which are parallel, diagonal, and perpendicular. …”
Get full text
Get full text
Thesis -
17
-
18
Development of optimization Alghorithm for uncertain non-linear dynamical system
Published 2004“…An algorithm that definitely can satisfy the objectives is the Dynamic Integrated Systems Optimization and Parameter Estimation (DISOPE) algorithm. …”
Get full text
Get full text
Monograph -
19
Extreme air pollutant data analysis using classical and Bayesian approaches
Published 2015“…MTM algorithm is an extension of MH algorithm, designed to improve the convergence of MH algorithm by performing parallel computation. …”
Get full text
Get full text
Thesis -
20
Application of Mellin-Kamal transformation in EL Gamal Ciphertext Cryptosystem / Nurul Syazwani Husairi and Nurul Aqilah Mohd Fauzi
Published 2023“…So, this study contributed to show a complete calculation and working to assist other future researchers know the complete step of the proposed scheme and reduce the probability of middle attackers and strengthen the existing algorithm with several cryptosystem integration. …”
Get full text
Get full text
Student Project
