Search Results - data distribution ((using algorithm) OR (matching algorithm))

Refine Results
  1. 1

    Hierarchical Bayesian estimation for stationary autoregressive models using reversible jump MCMC algorithm by Suparman, S., Rusiman, Mohd Saifullah

    Published 2018
    “…The performance of the algorithm is tested by using simulated data. The test results show that the algorithm can estimate the order and coefficients of the autoregressive model very well. …”
    Get full text
    Article
  2. 2

    The application of voltage sags pattern to locate a faulted section in distribution network by Mokhlis, Hazlie, Li, H.Y., Khalid, A.R.

    Published 2010
    “…This paper proposes an alternative automated fault location algorithm to locate a faulted section in distribution network using only voltage sag data monitored at the primary substation. …”
    Get full text
    Get full text
    Article
  3. 3
  4. 4
  5. 5
  6. 6

    Measuring height of high-voltage transmission poles using unmanned aerial vehicle (UAV) imagery by Qayyum, A., Malik, A.S., Saad, N.M., bin Abdullah, M.F., Iqbal, M., Rasheed, W., Bin Ab Abdullah, A.R., Hj Jaafar, M.Y.

    Published 2017
    “…Results were compared with well-known algorithms; including, for example, global and local stereo matching algorithms. …”
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Training data selection for record linkage classification by Zaturrawiah Ali Omar, Zamira Hasanah Zamzuri, Noratiqah Mohd Ariff, Mohd Aftar Abu Bakar

    Published 2023
    “…Three constructions were proposed to select non-match pairs for the training data, with both balanced (symmetry) and imbalanced (asymmetry) distributions tested. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    DC-based PV-powered home energy system by Sabry, Ahmad H.

    Published 2017
    “…The work initially investigates the feasibility of using the DC distribution system to power the locally available AC appliances, that are analyzed and evaluated individually to match the DC supply either by direct coupling or some modification. …”
    Get full text
    Get full text
    Thesis
  11. 11

    High-impedance fault location using matching technique and wavelet transform for underground cable distribution network by Ali, M.S., Bakar, Ab Halim Abu, Mokhlis, Hazlie, Arof, Hamzah, Illias, Hazlee Azil

    Published 2014
    “…The output coefficients from the decomposition process is stored in a database and used as the input data for the SD algorithm. The first, second, and third level of detailed coefficients of the post-disturbance voltage signal were utilized for the identification of the faulty section using the proposed method. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Assessment of landsat 7 scan line corrector-off data gap-filling methods for seagrass distribution mapping by Hossain, Mohammad Shawkat, Bujang, Japar Sidik, Zakaria @ Ya, Muta Harah, Hashim, Mazlan

    Published 2015
    “…For optimal performance of the GNSPI algorithm, cloud and shadow in the primary and auxiliary images had to be removed by cloud removal methods prior to filling data gaps. …”
    Get full text
    Get full text
    Article
  13. 13

    Development of a Web Access Control Technique Based User Access Behavior by Abdelrahman, Selmaelsheikh

    Published 2004
    “…The development and the wide spread use of the World Wide Web allow for convenient electronic data storage and distribution all over the world. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Adaptive and optimized radio resource allocation algorithms for OFDMA based networks by Saadat, Md. Nazmus

    Published 2015
    “…AORAA contains an adaptive and optimized subcarrier allocation algorithm which uses graph theoretic techniques to do the best probable matching of subcarrier and users’ channel information. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Semantic-Based, Scalable, Decentralized and Dynamic Resource Discovery for Internet-Based Distributed System by Hassan, Mahamat. I, Azween, Abdullah

    Published 2010
    “…Resource Discovery (RD) is a key issue in Internet-based distributed sytems such as grid. RD is about locating an appropriate resource/service type that matches the user’s application requirements. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Semantic-Based, Scalable, Decentralized and Dynamic Resource Discovery for Internet-Based Distributed System by HASSAN, MAHAMAT ISSA

    Published 2010
    “…Resource Discovery (RD) is a key issue in Internet-based distributed sytems such as grid. RD is about locating an appropriate resource/service type that matches the user's application requirements. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A multi-scale smart fault diagnosis model based on waveform length and autoregressive analysis for PV system maintenance strategies by Siti Nor Azlina, Mohd Ghazali, Muhamad Zahim, Sujod, Mohd Shawal, Jadin

    Published 2023
    “…The actual irradiance data at 5.86 °N and 102.03 °E were used as inputs to produce simulated data that closely matched the on-site PV output data. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Saleh Ahmed,, Ali Mohammed, Ali Majeed Alhammadi, Nafea, Ahmad Khalaf, Bashar, A. Mostafa, Salama

    Published 2023
    “…The intrusion detection evaluation dataset (CICIDS2017) is used to provide more realistic detection. The CICIDS2017 dataset includes benign and up-to-date examples of typical attacks, closely matching real-world data of Packet Capture. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Ahmed, Ali Mohammed Saleh, Majeed Alhammadi, Nafea Ali, Ahmad Khalaf, Bashar, A. Mostafa, Salama

    Published 2023
    “…The intrusion detection evaluation dataset (CICIDS2017) is used to provide more realistic detection. The CICIDS2017 dataset includes benign and up-to-date examples of typical attacks, closely matching real-world data of Packet Capture. …”
    Get full text
    Get full text
    Get full text
    Article