Search Results - (( using simulation method algorithm ) OR ( data evaluation method algorithm ))

Refine Results
  1. 1

    Data depublication using : Hashing algorithm / Naimah Nayan by Nayan, Naimah

    Published 2019
    “…The objective of this project is to compare MD5 & SHA-1 algorithm in data deduplication technique and to evaluate the MD5 & SHA-1 algorithm, length of message digest and speed using deduplication software. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Parallel algorithms for numerical simulations of EHD ion-drag micropump on distributed parallel computing systems by Shakeel Ahmed, Kamboh

    Published 2014
    “…Conventionally, the numerical simulations for such devices are obtained by using the commercial simulation packages based on the Finite Element Methods (FEM). …”
    Get full text
    Get full text
    Thesis
  3. 3

    A new ant based rule extraction algorithm for web classification by Ku-Mahamud, Ku Ruhana, Saian, Rizauddin

    Published 2011
    “…Methods to reduce the number of attributes and discretization are two important data pre-processing steps before the data can be used for classification activity. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  4. 4

    An Experiment of Ant Algorithms : Case Study of Kota Kinabalu Central Town by Nor Rafidah, Mohamad

    Published 2005
    “…Both algorithms are compared. Simulation is used as a method in this study. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Fuzzy clustering method and evaluation based on multi criteria decision making technique by Sameer, Fadhaa Othman

    Published 2018
    “…The proposed algorithm is used as a pre-processing method for data followed by Gustafson-Kessel (GK) algorithm to classify credit scoring data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Robust generalized multiplicative scatter correction algorithm on pretreatment of near infrared spectral data by Silalahi, Divo Dharma, Midi, Habshah, Arasan, Jayanthi, Mustafa, Mohd Shafie, Caliman, Jean-Pierre

    Published 2018
    “…To encounter these, a robust pretreatment of NIR spectral data is needed to correct the spectra before it is used for post-processing using any statistical method. …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    A novel peak load shaving algorithm for isolated microgrid using hybrid PV-BESS system by Rana, M.M., Romlie, M.F., Abdullah, M.F., Uddin, M., Sarkar, M.R.

    Published 2021
    “…To evaluate the effectiveness of the algorithm, simulation case studies have been conducted with actual load data and actual PV generation data. …”
    Get full text
    Get full text
    Article
  10. 10

    Development of an Automated Technique for Reconstructing Jawi Characters in Historical Documents by Zulcaffle, Tengku Mohd Afendi

    Published 2007
    “…The reliability of the proposed algorithms have been tested over simulated and real data. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Performance evaluation of different data aggregation algorithms for different types of sensors in WSN based cluster by Ali, Wala'a Hussein

    Published 2018
    “…In this project three different data aggregation algorithms coding schemes based relative difference (CS-RD), an adaptive method of data aggregation that exploits the spatial correlation between the sensor nodes (ADAM) and coding schemes based the factor of precision (CS-FP) are evaluated. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Detection of multiple outliners in linear regression using nonparametric methods by Adnan, Robiah

    Published 2004
    “…Generally, method proposed by Sebert et al. (1998) is based on the use of single linkage clustering algorithm with the Euclidean distances to cluster the points in the plots of standard predicted versus residuals values from a linear regression model. …”
    Get full text
    Get full text
    Monograph
  13. 13

    Iterative And Single-Step Solutions Of Two Dimensional Time-Domain Inverse Scattering Problem Featuring Ultra Wide Band Sensors by Binajjaj, Saeed Ali Saeed

    Published 2010
    “…Finally, the algorithms‘ robustness against the noisy data was evaluated using two simulated experiments with signal-to-noise ratios of 6 and 8 dB respectively.…”
    Get full text
    Get full text
    Thesis
  14. 14

    Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification by Abd Samad, Md Fahmi

    Published 2011
    “…A deterministic mutation-based algorithm is introduced to overcome this problem. Identification studies using NARX (Nonlinear AutoRegressive with eXogenous input) models employing simulated systems and real plant data are used to demonstrate that the algorithm is able to detect significant variables and terms faster and to select a simpler model structure than other well-known EC methods.…”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Resource scheduling algorithm with load balancing for cloud service provisioning by Priya, V., Sathiya Kumar, C., Kannan, R.

    Published 2019
    “…Simulations were conducted to evaluate the effectiveness using Cloudsim simulator in cloud data centers and results shows that the proposed method achieves better performance in terms of average success rate, resource scheduling efficiency and response time. …”
    Get full text
    Get full text
    Article
  16. 16

    Evaluating power efficient algorithms for efficiency and carbon emissions in cloud data centers: a review by Uddin, Mueen, Darabidarabkhani, Yasaman, Shah, Asadullah, Memon, Jamshed

    Published 2015
    “…The three algorithms are evaluated for performance using three parameters; power efficiency, cost effectiveness, and amount of CO2 emissions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Development of a new robust hybrid automata algorithm based on surface electromyography (SEMG) signal for instrumented wheelchair control by Mohd Hanafi, Muhammad Sidik

    Published 2020
    “…Total of ten control methods determined from population and individual data were tested against another 10 healthy persons to evaluate the algorithm performance. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Satellite attitude determination utilizing measurement sensor data and kalman filtering by Samaan, Malak A., Abdelrahman, Mohammad

    Published 2006
    “…Using only star measurements an optimal satellite orientation estimate is found using the method of least squares, and the particular algorithm invoked is referred to ESOQ2 method. …”
    Get full text
    Get full text
    Article
  20. 20

    Optimization of RFID network planning using MDB-FA method by Elewe, Adel Muhsin, Hasnan, Khalid, Nawawi, Azli

    Published 2017
    “…Monte Carlo simulation (MCS) is used to generate tag distribution based on network topology design modules as a method to evaluate the deterministic indicators in NP-hard problems. …”
    Get full text
    Get full text
    Article