Search Results - normal distribution ((factor algorithm) OR (based algorithm))

Refine Results
  1. 1

    The effect of dose calculation algorithms on the normal tissue complication probability values of thoracic cancer by Ahmad, Noor Ashikin

    Published 2015
    “…Purpose: To identify the effect of dose calculation algorithms on the Normal Tissue Complication Probability values of thoracic cancer. …”
    Get full text
    Get full text
    Monograph
  2. 2

    Optimal network reconfiguration and intelligent service restoration prediction technique based on Cuckoo search spring algorithm / Mohamad Izwan Zainal by Zainal, Mohamad Izwan

    Published 2022
    “…In this research, Cuckoo Search Spring Algorithm (CSSA) is proposed to enhance the robustness of algorithm by constructing the optimal network reconfiguration consist of reducing power losses and improve voltage profile with the various loadability factor as the constraint according to load profile, based on single and multiobjective model. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Peak pressure analysis of foot plantar distribution based on image processing algorithm by Sabry, Ali Hussein

    Published 2018
    “…The other main goal of this work is to create an algorithm which has the ability to formulate accurately and reliably the distribution of pressure over the foot plantar. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs by Khan, T., Singh, K., Hasan, M.H., Ahmad, K., Reddy, G.T., Mohan, S., Ahmadian, A.

    Published 2021
    “…However, a trust-based attack detection algorithm (TADA) assesses the reliability of SNs to detect internal attacks. …”
    Get full text
    Get full text
    Article
  5. 5

    Efficient task scheduling strategies using symbiotic organisms search algorithm for cloud computing environment by Sa'ad, Suleiman

    Published 2022
    “…Also, the results of the simulations on normal, left-half, right-half and uniform datasets showed the proposed scheduling approach obtained a better performance on degree of imbalance over the benchmarked OTB-CSO algorithm. …”
    Get full text
    Get full text
    Thesis
  6. 6

    An Integrated Principal Component Analysis And Weighted Apriori-T Algorithm For Imbalanced Data Root Cause Analysis by Ong, Phaik Ling

    Published 2016
    “…In conclusion, the proposed algorithm is able to overcome the rare item issue by implementing covariance based support value normalization and high computational costs issue by implementing indexing enumeration tree structure.Future work of this study should focus on rule interpretation to generate more human understandable rule by novice in data mining. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation by Chen, Qipeng, Xiong, Qiaoqiao, Huang, Haisong, Tang, Saihong, Liu, Zhenghong

    Published 2024
    “…Finally, the concept of model compression is integrated, utilizing scaling factors in the batch normalization (BN) layer, and introducing sparse factors to perform sparse training on the network. …”
    Get full text
    Get full text
    Article
  9. 9

    Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution / Nor Azura Ayop by Ayop, Nor Azura

    Published 2016
    “…Log likelihood estimation technique is used to fit the best 2-parameter CDF compared to Weibull, Normal and Rician distribution model. The percentage level 5% under original bandwidth used is developed on policing and shaping algorithms to control bandwidth used. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution: article / Nor Azura Ayop by Ayop, Nor Azura

    Published 2016
    “…Log likelihood estimation technique is used to fitted the best 2-parameter CDF compared to WeibuII, Normal and Rician distribution model. The percentage level 5% under original bandwidth used is developed on policing and shaping algorithms to control bandwidth used. …”
    Get full text
    Get full text
    Article
  12. 12

    JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation by Abu, Ahmad Zaidee

    Published 2008
    “…The proposed approach uses a frequency domain combinational framework of coefficients scrambling with Key Scheduling Algorithm based (KSA-based) permutation. This novel algorithm applies coefficients scrambling using Combined-Reverse-and-Normal-Direction (CRND) scanning together with Distorted DC permutation (DDP). …”
    Get full text
    Get full text
    Thesis
  13. 13

    Parallel distributed genetic algorithm development based on microcontrollers framework by Krishnan P.S., Kiong T.S., Koh J.

    Published 2023
    “…This work is focused on the implementation of evolutionary based computer algorithms, genetic algorithms (GAs), on microcontrollers. …”
    Conference paper
  14. 14

    Optimum capacitor placement and sizing for distribution system based on an improved voltage stability index by Aman, M.M., Jasmon, G.B., Bakar, A.H.A., Mokhlis, Hazlie

    Published 2012
    “…An algorithm is also proposed, based on RVSI, for optimum shunt capacitor placement in the distribution system. …”
    Get full text
    Get full text
    Article
  15. 15

    Parallel distributed computational microcontroller system for adaptive antenna downlink transmitter power optimization by Sankar K.P., Tiong S.K., Koh S.P.J.

    Published 2023
    “…Parallel Distributed Genetic Algorithm (PDGA) is employed in adaptive beam forming technique to reduce power usage of adaptive antenna at WCDMA base station. …”
    Article
  16. 16

    Confidence intervals (CI) for concentration parameter in von Mises distribution and analysis of missing values for circular data / Siti Fatimah binti Hassan by Hassan, Siti Fatimah

    Published 2015
    “…Directional statistics is a branch of statistics which deal with the data in angle form in which the method of analysis is different from linear data. For example, the distribution analogues to the normal distribution in linear data is known as circular normal distribution. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah by Abdullah, Mohd Azrul

    Published 2015
    “…Based on the identified statistical parameters, a new Time Based Policing and Shaping algorithm is developed and simulated. …”
    Get full text
    Get full text
    Article
  18. 18

    High Impedance Fault Detection on Power Distribution Feeder by Sulaiman , Marizan, Tawafan, Adnan, Ibrahim, Zulkifilie

    Published 2012
    “…The algorithm for HIF detection based on the amplitude ratio of second and (3rd, 5th, 7th, 9th, 11th) harmonics to fundamental is presented. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Dynamic Robust Bootstrap Algorithm for Linear Model Selection Using Least Trimmed Squares by Uraibi, Hassan Sami

    Published 2009
    “…One of the important assumptions of the linear model is that the error terms are normally distributed. Unfortunately, many researchers are not aware that the performance of the OLS can be very poor when the data set that one often makes a normal assumption, has a heavy-tailed distribution which may arise as a result of the presence of outliers. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah by Abdullah, Mohd Azrul

    Published 2015
    “…Based on the identified statistical parameters, a new Time Based Policing and Shaping algorithm is developed and simulated. …”
    Get full text
    Get full text
    Thesis