Search Results - normal distribution ((factor algorithm) OR (_ algorithm))
Search alternatives:
-
1
The effect of dose calculation algorithms on the normal tissue complication probability values of thoracic cancer
Published 2015“…Purpose: To identify the effect of dose calculation algorithms on the Normal Tissue Complication Probability values of thoracic cancer. …”
Get full text
Get full text
Monograph -
2
Optimal network reconfiguration and intelligent service restoration prediction technique based on Cuckoo search spring algorithm / Mohamad Izwan Zainal
Published 2022“…In this research, Cuckoo Search Spring Algorithm (CSSA) is proposed to enhance the robustness of algorithm by constructing the optimal network reconfiguration consist of reducing power losses and improve voltage profile with the various loadability factor as the constraint according to load profile, based on single and multiobjective model. …”
Get full text
Get full text
Thesis -
3
A new efficient checkpointing algorithm for distributed mobile computing
Published 2015“…Considering this issue, the contribution in this paper is a proposal of a new checkpointing algorithm suitable for mobile computing systems. This algorithm is characterized by its efficiency and optimization in terms of incurred time-space overhead during checkpointing process and normal application running period.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
4
An Integrated Principal Component Analysis And Weighted Apriori-T Algorithm For Imbalanced Data Root Cause Analysis
Published 2016“…A semiconductor manufacturing case study with Work In Progress data and true alarm data is used to proof the proposed algorithm. The proposed PCA-WAT algorithm is benchmarked with the Apriori and Apriori-T algorithms.Comparison analysis on weighted support has been performed to evaluate the capability of PCA in normalising item’s support value. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Efficient task scheduling strategies using symbiotic organisms search algorithm for cloud computing environment
Published 2022“…Also, the results of the simulations on normal, left-half, right-half and uniform datasets showed the proposed scheduling approach obtained a better performance on degree of imbalance over the benchmarked OTB-CSO algorithm. …”
Get full text
Get full text
Thesis -
6
Peak pressure analysis of foot plantar distribution based on image processing algorithm
Published 2018“…The other main goal of this work is to create an algorithm which has the ability to formulate accurately and reliably the distribution of pressure over the foot plantar. …”
Get full text
Get full text
Get full text
Thesis -
7
Optimal placement and sizing of distributed generation in radial distribution networks using particle swarm optimization and forward backward sweep method
Published 2012“…The proposed PSO algorithm is used to determine optimal placement and size of DG in radial distribution networks, where Forward Backward Sweep Method (FBSM) of distribution load flow analysis was used, to determine the actual power loss in the system. …”
Get full text
Get full text
Thesis -
8
ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs
Published 2021“…ETERS utilizes the Beta distribution-based trust function because recovery of trust values under attacks is faster in Beta distribution than Gaussian and Dirichlet distribution. …”
Get full text
Get full text
Article -
9
-
10
Modeling Earthquake Bond Prices with Correlated Dual Trigger Indices and the Approximate Solution Using the Monte Carlo Algorithm
Published 2025journal::journal article -
11
Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation
Published 2024“…Finally, the concept of model compression is integrated, utilizing scaling factors in the batch normalization (BN) layer, and introducing sparse factors to perform sparse training on the network. …”
Get full text
Get full text
Article -
12
Improved performance in distributed estimation by convex combination of DNSAF and DNLMS algorithms
Published 2022“…Diffusion normalized least mean square (DNLMS) algorithm has low misadjustment error, but it is slow in convergence. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
13
Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution / Nor Azura Ayop
Published 2016“…Log likelihood estimation technique is used to fit the best 2-parameter CDF compared to Weibull, Normal and Rician distribution model. The percentage level 5% under original bandwidth used is developed on policing and shaping algorithms to control bandwidth used. …”
Get full text
Get full text
Thesis -
14
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
15
Bi-objective mixed integer nonlinear programming model for low carbon location-inventory-routing problem with time windows and customer satisfaction
Published 2024“…This paper proposes a bi-objective mixed-integer nonlinear programming model with time window constraints that satisfies the normal distribution of stochastic customer demand. …”
Get full text
Get full text
Get full text
Article -
16
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023“…This work is focused on the implementation of evolutionary based computer algorithms, genetic algorithms (GAs), on microcontrollers. …”
Conference paper -
17
Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution: article / Nor Azura Ayop
Published 2016“…Log likelihood estimation technique is used to fitted the best 2-parameter CDF compared to WeibuII, Normal and Rician distribution model. The percentage level 5% under original bandwidth used is developed on policing and shaping algorithms to control bandwidth used. …”
Get full text
Get full text
Article -
18
JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation
Published 2008“…This thesis work studied on digital image encryption algorithms performed towards JPEG images. With image encryption algorithms, JPEG images can be securely scrambled or encrypted prior to distribution. …”
Get full text
Get full text
Thesis -
19
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Monograph -
20
Software reusability in green computing / Ibraheem Y. Y. Ahmaro
Published 2013“…Reliability analysis, factor analysis, normality analysis, correlation analysis and regression analysis are used to analyze the amassed data. …”
Get full text
Get full text
Thesis
