Search Results - (( data distribution from algorithm ) OR ( parameter estimation window algorithm ))

Refine Results
  1. 1
  2. 2

    Surface Moisture Content Retrieval from Visible/Thermal Infrared Images and Field Measurements by Abdalla HASSABALLA, Abdalhaleem, MATORI , Abdul Nasir, Mohd SHAFRI, Helmi Zulhaidi

    Published 2013
    “…Moisture content parameters were calculated, and then the moisture content algorithm was generated accordingly for the two study locations with three different “Split-windowalgorithms and finally a spatial validation of satellite θ algorithms was conducted for accuracy assessment. …”
    Get full text
    Get full text
    Article
  3. 3

    Development Of Distributed Grid-Based Hydrological Model And Floodplain Inundation Management System by Al_Fugara, A’kif Mohammed Salem

    Published 2008
    “…The land use/cover classes were derived from interpreted information of Landsat TM imagery using the combined object-oriented segmentation - fuzzy logic algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Analyzing land surface temperature in response to massive urbanization by using single window algorithm in Penang Island / Ainna Naeemah Zainal Abidin by Zainal Abidin, Ainna Naeemah

    Published 2019
    “…Land Surface Temperature is one of the key parameters in order to estimate the surface energy budget assessing massive urbanization (Srivastava, Majumdar, & Bhattacharya, 2010). …”
    Get full text
    Get full text
    Thesis
  5. 5

    Orthogonal Frequency Division Multiple Access resource unit allocation algorithms for IEEE 802.11AX medium access control protocol by Zazali, Azyyati Adiah

    Published 2024
    “…The simulation results demonstrated that the proposed algorithms significantly outperformed the benchmark algorithms across several metrics. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Binary Vote Assignment on Cloud Quorum Algorithm for Fragmented MyGRANTS Database Replication by Noraziah, Ahmad, Ainul Azila, Che Fauzi, Herawan, Tutut, Zailani, Abdullah

    Published 2015
    “…Therefore, the storage, availability, and consistency are important issues to be addressed in order to allow distributed users efficiently and safely access data from many different sites. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Estimation Of Weibull Parameters Using Simulated Annealing As Applied In Financial Data by Hamza, Abubakar

    Published 2023
    “…The MIRR were computed based on the data extracted from the companies’ financial reports from 2010 to 2018. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    A novel binary vote assignment grid quorum algorithm for distributed database fragmentation by Ainul Azila, Che Fauzi, Noraziah, Ahmad, Noriyani, Mohd Zin

    Published 2011
    “…Therefore, the storage, availability, and consistency are important issues to be addressed in order to allow distributed users efficiently and safely access data from many different sites. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Network reconfiguration and control for loss reduction using genetic algorithm by Jawad, Mohamed Hassan Izzaldeen

    Published 2010
    “…All the data for 18-bus system test are taken from previous work, and all the data for 49-bus system test are taken from an existing Iraqi distribution network. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen by Shawkat S.A., Tuama B.A., Al-Barazanchi I.

    Published 2023
    “…In this paper, a comparative study is done between the two security algorithms on a cloud platform called eyeOS. From the comparative study it was found that the Rivest Shamir Adlemen (3kRSA) algorithm outperforms that triple data encryption standard (3DES) algorithm with respect to the complexity, and output bytes. …”
    Article
  13. 13

    Scheduled activity energy-aware distributed cluster- based routing algorithm for wireless sensor networks with non-uniform node distribution by Nokhanji, Nooshin

    Published 2014
    “…The main and definitive target of routing protocols in Wireless Sensor Networks (WSN) is passing data from the sensor nodes to the sink in most energy efficient manner besides considering the accuracy of data. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Three phase fault algorithm in distribution system by using database approach and impedance based method by Shamsudin, N.H., Latiff, A.A., Abas, N., Mokhlis, Hazlie, Awalin, L.J.

    Published 2012
    “…The comparison is made through proposed algorithm with actual data acquired from the utility board. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Dynamic replication aware load blanced scheduling in distributed environment / Said Bakhshad by Said Bakhshad, Bakhshad

    Published 2018
    “…Grid computing is an effective distributed and adaptable processing network that manages a huge number of data applications. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Confidence intervals (CI) for concentration parameter in von Mises distribution and analysis of missing values for circular data / Siti Fatimah binti Hassan by Hassan, Siti Fatimah

    Published 2015
    “…For example, the distribution analogues to the normal distribution in linear data is known as circular normal distribution. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Energy Management in Integrated Microgrids: An Optimal Schedule Controller Utilizing Gradient Descent Algorithm by Abdolrasol M.G.M., Ker P.J., Hannan M.A., Ayob A., Tiong S.K.

    Published 2024
    “…The proposed approach is evaluated on the IEEE fourteen bus test system with integrated Microgrids (MGs) and distributed generations, using real load demand data from Perlis, Malaysia, for 24-hour test case studies. …”
    Conference Paper
  18. 18

    Applying non-informative G-prior for logistic regression models with different patterns of data points by Pham, Huong T.T., Pham, Hoa, Siong Yow, Kai

    Published 2025
    “…In this proposed method, the information from observed data and ideas of a normal regression model are implemented to form the mean and standard deviation of the normal prior distributions. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Privacy in medical emergency system: cryptographic and security aspects by Hameed, Shihab A., Yuchoch, Habib, Al-Khateeb, Wajdi Fawzi Mohammed

    Published 2010
    “…This paper shows the results of processing time of data encryption between asymmetric key algorithm (RSA) and symmetric key algorithm (AES) which includes its key-distribution processing time with client’s public key (RSA) from small to large amount of data. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper