Search Results - (( data distribution matching algorithm ) OR ( _ evacuation under algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Hierarchical Bayesian estimation for stationary autoregressive models using reversible jump MCMC algorithm by Suparman, S., Rusiman, Mohd Saifullah

    Published 2018
    “…The performance of the algorithm is tested by using simulated data. The test results show that the algorithm can estimate the order and coefficients of the autoregressive model very well. …”
    Get full text
    Article
  4. 4
  5. 5

    The application of voltage sags pattern to locate a faulted section in distribution network by Mokhlis, Hazlie, Li, H.Y., Khalid, A.R.

    Published 2010
    “…This paper proposes an alternative automated fault location algorithm to locate a faulted section in distribution network using only voltage sag data monitored at the primary substation. …”
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Training data selection for record linkage classification by Zaturrawiah Ali Omar, Zamira Hasanah Zamzuri, Noratiqah Mohd Ariff, Mohd Aftar Abu Bakar

    Published 2023
    “…Three constructions were proposed to select non-match pairs for the training data, with both balanced (symmetry) and imbalanced (asymmetry) distributions tested. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Measuring height of high-voltage transmission poles using unmanned aerial vehicle (UAV) imagery by Qayyum, A., Malik, A.S., Saad, N.M., bin Abdullah, M.F., Iqbal, M., Rasheed, W., Bin Ab Abdullah, A.R., Hj Jaafar, M.Y.

    Published 2017
    “…Results were compared with well-known algorithms; including, for example, global and local stereo matching algorithms. …”
    Get full text
    Get full text
    Article
  9. 9
  10. 10
  11. 11

    Survey on job scheduling mechanisms in grid environment by S. M., Argungu, Che Mohamed Arif, Ahmad Suki, Omar, Mohd Hasbullah

    Published 2015
    “…Grid systems provide geographically distributed resources for both computational intensive and data-intensive applications.These applications generate large data sets.However, the high latency imposed by the underlying technologies; upon which the grid system is built (such as the Internet and WWW), induced impediment in the effective access to such huge and widely distributed data.To minimize this impediment, jobs need to be scheduled across grid environments to achieve efficient data access.Scheduling multiple data requests submitted by grid users onto the grid environment is NP-hard.Thus, there is no best scheduling algorithm that cuts across all grids computing environments.Job scheduling is one of the key research area in grid computing.In the recent past many researchers have proposed different mechanisms to help scheduling of user jobs in grid systems.Some characteristic features of the grid components; such as machines types and nature of jobs at hand means that a choice needs to be made for an appropriate scheduling algorithm to march a given grid environment.The aim of scheduling is to achieve maximum possible system throughput and to match the application needs with the available computing resources.This paper is motivated by the need to explore the various job scheduling techniques alongside their area of implementation.The paper will systematically analyze the strengths and weaknesses of some selected approaches in the area of grid jobs scheduling.This helps researchers better understand the concept of scheduling, and can contribute in developing more efficient and practical scheduling algorithms.This will also benefit interested researchers to carry out further work in this dynamic research area.…”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Assessment of landsat 7 scan line corrector-off data gap-filling methods for seagrass distribution mapping by Hossain, Mohammad Shawkat, Bujang, Japar Sidik, Zakaria @ Ya, Muta Harah, Hashim, Mazlan

    Published 2015
    “…For optimal performance of the GNSPI algorithm, cloud and shadow in the primary and auxiliary images had to be removed by cloud removal methods prior to filling data gaps. …”
    Get full text
    Get full text
    Article
  13. 13

    DC-based PV-powered home energy system by Sabry, Ahmad H.

    Published 2017
    “…The work initially investigates the feasibility of using the DC distribution system to power the locally available AC appliances, that are analyzed and evaluated individually to match the DC supply either by direct coupling or some modification. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Temporal - spatial recognizer for multi-label data by Mousa, Aseel

    Published 2018
    “…Hence, there is a need for a recognition algorithm that can separate the overlapping data points in order to recognize the correct pattern. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17

    Development of a Web Access Control Technique Based User Access Behavior by Abdelrahman, Selmaelsheikh

    Published 2004
    “…The development and the wide spread use of the World Wide Web allow for convenient electronic data storage and distribution all over the world. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A multi-scale smart fault diagnosis model based on waveform length and autoregressive analysis for PV system maintenance strategies by Siti Nor Azlina, Mohd Ghazali, Muhamad Zahim, Sujod, Mohd Shawal, Jadin

    Published 2023
    “…The actual irradiance data at 5.86 °N and 102.03 °E were used as inputs to produce simulated data that closely matched the on-site PV output data. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Saleh Ahmed,, Ali Mohammed, Ali Majeed Alhammadi, Nafea, Ahmad Khalaf, Bashar, A. Mostafa, Salama

    Published 2023
    “…The CICIDS2017 dataset includes benign and up-to-date examples of typical attacks, closely matching real-world data of Packet Capture. The four models are tested and assessed using Confusion Metrix against four commonly used criteria: accuracy, precision, recall, and F-measure. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Ahmed, Ali Mohammed Saleh, Majeed Alhammadi, Nafea Ali, Ahmad Khalaf, Bashar, A. Mostafa, Salama

    Published 2023
    “…The CICIDS2017 dataset includes benign and up-to-date examples of typical attacks, closely matching real-world data of Packet Capture. The four models are tested and assessed using Confusion Metrix against four commonly used criteria: accuracy, precision, recall, and F-measure. …”
    Get full text
    Get full text
    Get full text
    Article