Search Results - normal distribution ((path algorithm) OR (selection algorithm))
Search alternatives:
- selection algorithm »
- path algorithm »
-
1
-
2
Dynamic Robust Bootstrap Algorithm for Linear Model Selection Using Least Trimmed Squares
Published 2009“…One of the important assumptions of the linear model is that the error terms are normally distributed. Unfortunately, many researchers are not aware that the performance of the OLS can be very poor when the data set that one often makes a normal assumption, has a heavy-tailed distribution which may arise as a result of the presence of outliers. …”
Get full text
Get full text
Thesis -
3
Development of classification model between clean water and polluted water based on capacitance properties using Levenberg Marquardt (LM) algorithm of artificial neural network / M...
Published 2020“…For both cases, the statistical analysis data show that the p-value is more than 0.05, which indicates that the data are normally distributed. These measurement inputs were then going through the process of classification in ANN to generate the optimized models by using LM algorithm. …”
Get full text
Get full text
Student Project -
4
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…The focus of this analysis is on original observations that performed a detecting outlier and power transformation to transform not normally distributed data to near normality. The correlation of each system calls are examined using coefficient correlations of each selected system call variables. …”
Get full text
Get full text
Thesis -
5
Investigation of evolutionary multi-objective algorithms in solving view selection problem / Seyed Hamid Talebian
Published 2013“…In addition to the normal metrics, the computational time for executing each algorithm was also measured and compared. …”
Get full text
Get full text
Thesis -
6
SOVA decoding in symmetric alpha-stable noise
Published 2011“…Fundamentally, conventional SOVA is designed on the basis of Maximum A-Posteriori Probability (APP) with the assumption of normal distribution. Therefore, conventional SOVA fails miserably in the presence of symmetric alpha stable noise S\ensuremathα S which is one form of stable random processes widely accepted for impulsive noise modeling. …”
Get full text
Get full text
Conference or Workshop Item -
7
A study on advanced statistical analysis for network anomaly detection
Published 2005“…The focus of this analysis is on original observations that performed a detecting outlier and power transformation to transform not normally distributed data to near normality. The correlation of each system calls are examined using coefficient correlations of each selected system call variables. …”
Get full text
Monograph -
8
The comparison of tardiness in scheduling techniques for task distribution using grid simulation tool
Published 2008“…The goal of this project is to test on tardiness parameter in local search based algorithms. A good scheduling algorithm normally shows lower value of total tardiness and schedule time. …”
Get full text
Get full text
Get full text
Thesis -
9
An enhanced cluster head selection algorithm for routing in mobile AD-HOC network
Published 2017“…This thesis proposes an algorithm for increasing the stability of the cluster by selecting the most stable cluster head, maintaining the cluster structure with minimum maintenance overhead, and finding the best performance routing algorithm for use over MANET. …”
Get full text
Get full text
Thesis -
10
Identification of non-equilibrium growth for bitcoin exchange rate: mathematical derivation method in Islamic financial engineering
Published 2017“…Graphical method indicates the first difference of data distribution is a non-normal distribution. Then, Shapiro-Wilk statistical test confirmed that first difference of data distribution deviate from normal distribution. …”
Get full text
Get full text
Get full text
Article -
11
A Study of Ikaz and Normalized Hilbert transform for solving faulty in pipeline distribution system using transmission line modelling
Published 2019Get full text
Get full text
Get full text
Conference or Workshop Item -
12
-
13
Fault identification in pipeline system using normalized hilbert huang transform and automatic selection of intrinsic mode function
Published 2018“…Normalized Ikaz is recommended and advised to be implemented as automatic selection of intrinsic mode function (IMF) through NHHT analysis.…”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Optimal network reconfiguration and intelligent service restoration prediction technique based on Cuckoo search spring algorithm / Mohamad Izwan Zainal
Published 2022“…Modern distribution network is a complex network due to load demand varies and normally designed in radial circuit in which the circuit has ready to close switch at the end of the circuit when the situation needed. …”
Get full text
Get full text
Thesis -
15
Omega grey wolf optimizer (ωGWO) for optimization of overcurrent relays coordination with distributed generation
Published 2019“…The GWO algorithm is tested to four different test cases which are IEEE 3 bus (consists of six OCRs), IEEE 8 bus (consists of 14 OCRs), 9 bus (consists of 24 OCRs) and IEEE 15 bus (consists of 42 OCRs) test systems with normal inverse (NI) characteristic curve for all test cases and very inverse (VI) curve for selected cases to test the flexibility of the GWO algorithm. …”
Get full text
Get full text
Thesis -
16
Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique
Published 2018“…Previous researchers normally select the IMF visually, based on the user’s experience, and introduced a merit index that allows the automatic selection of the IMF. …”
Get full text
Get full text
Thesis -
17
Optimal placement and sizing of distributed generation in radial distribution networks using particle swarm optimization and forward backward sweep method
Published 2012“…To address these issues, this thesis focuses mainly on the optimal placement and sizing of DG in the distribution networks. Electrical distribution network systems normally include distribution feeders,which are arranged or configured either in mesh or radial pattern and they are mainly fed by a utility substation. …”
Get full text
Get full text
Thesis -
18
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
Published 2012“…The distribution of data will be based on the chosen percentages,which is entered by a sender.These percentages will be agreed between both the sender and the receiver as a key of hiding.The proposed system goal is to provide more complexity in encryption and make the embedding capacity as high as possible with high visible quality in a way that it does not allow any attacker to even detect that there are secret messages.The complexity of encryption and concealment was checked out with a number of widely used metrics such as Peak Signal to Noise Ratio(PSNR),Mean Squared Error(MSE), Normalized Absolute Error (NAE) and Normalized Correlation Coefficient (NCC).The experimental results demonstrate the complexity of the proposed method compared with the standard and existing methods.…”
Get full text
Get full text
Thesis -
19
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
Published 2012“…The distribution of data will be based on the chosen percentages,which is entered by a sender.These percentages will be agreed between both the sender and the receiver as a key of hiding.The proposed system goal is to provide more complexity in encryption and make the embedding capacity as high as possible with high visible quality in a way that it does not allow any attacker to even detect that there are secret messages.The complexity of encryption and concealment was checked out with a number of widely used metrics such as Peak Signal to Noise Ratio(PSNR),Mean Squared Error(MSE), Normalized Absolute Error (NAE) and Normalized Correlation Coefficient (NCC).The experimental results demonstrate the complexity of the proposed method compared with the standard and existing methods.…”
Get full text
Get full text
Undergraduates Project Papers -
20
ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs
Published 2021“…A novel and efficient cluster head selection algorithm (ECHSA) is employed to improve the performance of the cluster head (CH) selection process in clustered WSN. …”
Get full text
Get full text
Article
