Search Results - (( using poisson based algorithm ) OR ( java application customization algorithm ))

  • Showing 1 - 17 results of 17
Refine Results
  1. 1

    Pembangunan model regresi poisson sifar-melambung berintegrasi dalam biostatistik by Zafakali, Nur Syabiha

    Published 2018
    “…An overview of the overall model was also performed to obtain information related to the efficiency of the model. The algorithm was developed based on the concept of improvement and every detail of the methods used will be explained carefully on the methodology. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Poisson Transmuted Exponential Distribution For Count Data With Skewed, Dispersed And Excess Zero by Ademola Abiodun, Adetunji

    Published 2024
    “…The Obtained Distributions Are Assumed As Mixing Distributions For The Parameter Of The Poisson Distribution In The Mixed Poisson Process. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Modified zero inflated poisson regression analysis and its application to public health data by Wan Ahmad, Wan Muhamad Amir, Zafakali, Nur Syabiha, Aleng, Nor Azlida, Mohd Ibrahim, Mohamad Shafiq, Hasan, Ruhaya, Mokhtar, Kasypi

    Published 2019
    “…This paper focuses on the programming of zero inflated Poisson regression (ZIPR) with combination of fuzzy regression method through SAS algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    New Quarter-Sweep-Based Accelerated Over-Relaxation Iterative Algorithms and their Parallel Implementations in Solving the 2D Poisson Equation by Rakhimov, Shukhrat

    Published 2010
    “…The parallel strategies used in the new algorithms are based on the message latency minimization and processor-independent iterations.…”
    Get full text
    Get full text
    Thesis
  6. 6

    Predicting the popularity of tweets using the theory of point processes. by Tan, Wai Hong

    Published 2019
    “…The intensity process of the model is interpretable as a cluster Poisson process, which implies that the model can be simulated using the cascading algorithm similar to that used for the efficient simulation of Hawkes processes, and the prediction can be done properly by exploiting the probabilistic properties of the model. …”
    Get full text
    Get full text
    UMK Etheses
  7. 7

    Power plant energy predictions based on thermal factors using ridge and support vector regressor algorithms by Afzal, Asif, Alshahrani, Saad, Alrobaian, Abdulrahman, Buradi, Abdulrajak, Khan, Sher Afghan

    Published 2021
    “…Initially, the Ridge algorithm-based modeling is performed in detail, and then SVR-based LR, named as SVR (LR), SVR-based radial basis function—SVR (RBF), and SVR-based polynomial regression—SVR (Poly.) algorithms, are applied. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Analysis Of Large In-Plane Displacement And Strain In Rubber Using 2-D Scanner-Based Digital Image Correlation by Pang, Goh Ching

    Published 2017
    “…The axial strains obtained by using the proposed single-step 2-D SB-DIC algorithm were compared with those obtained using the conventional incremental image correlation algorithm. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    A graphical user interface application for continuous-time identification of dynamical system by Rahmat, Mohd. Fua'ad, Omar, Rosli, Jamaluddin, Hishamuddin

    Published 2002
    “…This paper introduces a Graphical User Interface (GUI) application in system identification and parameter estimation of dynamic systems using Generalized Poisson Moment Functionals (GPMF) method based on Instrumental Variable (IV) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Analysis of Large In-Plane Displacement and Strain in Rubber Using 2-D Scanner-Based Digital Image Correlation by Goh, Ching Pang

    Published 2017
    “…The axial strains obtained by using the proposed single-step 2-D SB-DIC algorithm were compared with those obtained using the conventional incremental image correlation algorithm. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Identification of material properties of composite plates using Fourier-generated frequency response functions by Tam, Jun Hui, Ong, Zhi Chao, Lau, Chun Lek, Ismail, Zubaidah, Ang, Bee Chin, Khoo, Shin Yee

    Published 2019
    “…The present research adopts the use of Fourier-based plate model to synthesize FRFs for its proven prominent accuracy and incorporates with a hybrid optimization algorithm. …”
    Get full text
    Get full text
    Article
  14. 14

    Recognition of multi-type and multi-oriented text in videos / Sangheeta Roy by Sangheeta , Roy

    Published 2018
    “…To recognize the text in video images, Bayesian classifier-based method has been investigated for binarization to use available OCR. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    3D face recognition using triplet point cloud network for the identification of a person with a face mask / Muhammad Azhad Zuraimi by Zuraimi, Muhammad Azhad

    Published 2023
    “…A novel data augmentation using Poisson disk subsampling was implemented to enlarge the dataset. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Multicast-unicast key management and data delivery method in wireless IPv6 networks by Zare Anari, Abbas Mehdizadeh

    Published 2012
    “…The feasibility and performance of the proposed key management method is evaluated analytically and empirically (in an IPv6 test-bed environment), as well as is analyzed based on Markov Chain and Poisson Arrival Process. …”
    Get full text
    Get full text
    Thesis