Search Results - (( data distribution system algorithm ) OR ( model evaluation between algorithm ))
Search alternatives:
- evaluation between »
- data distribution »
- between algorithm »
- system algorithm »
- model evaluation »
-
1
Replica Creation Algorithm for Data Grids
Published 2012“…This thesis presents a new replication algorithm that improves data access performance in data grids by distributing relevant data copies around the grid. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
The effect of dose calculation algorithms on the normal tissue complication probability values of thoracic cancer
Published 2015“…Materials and Methods: NTCP values from BIOPLAN software is calculated based on standard DVH data. Dose distributions of treatment plans are calculated by using two different algorithms of Oncentra Masterplan (OMP) treatment planning system (TPS) which are Collapse Cone and Pencil Beam. …”
Get full text
Get full text
Monograph -
3
Detection of leak size and its location in a water distribution system by using K-NN / Nasereddin Ibrahim Sherksi
Published 2020“…The system is simulated using EPANET (Environmental Prediction Agency Network) software based on actual water distribution system (WDS) data from Benghazi city, Libya. …”
Get full text
Get full text
Thesis -
4
Topology-aware hypergraph based approach to optimize scheduling of parallel applications onto distributed parallel architectures
Published 2020“…Modelling refers to constructing a model to depict the structure of the application with its tasks and describing the interactions between them. …”
Get full text
Get full text
Thesis -
5
Join query enhancement processing (jqpro) with big rdf data on a distributed system using hashing-merge join technique
Published 2021“…(iii) evaluate and compare the performance based on the execution time, throughput, and CPU utilization of the JQPro model with existing models. …”
Get full text
Get full text
Thesis -
6
Benchmarking Robust Machine Learning Models Under Data Imperfections in Real-World Data Science Scenarios
Published 2026“…The findings demonstrate that robustness is multidimensional and dependent on alignment between model inductive bias and data imperfection type. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Prediction of hydropower generation via machine learning algorithms at three Gorges Dam, China
Published 2024“…The statistical analysis and pre-processing techniques were applied to the raw data before developing the models. Five statistical indexes are employed to evaluate the performances of various models developed. …”
Article -
8
Voltage and load profiles estimation of distribution network using independent component analysis / Mashitah Mohd Hussain
Published 2014“…First, voltage profile on source distribution system is estimated. The voltage profile is predicted using Independent Component Analysis (lCA) algorithm. …”
Get full text
Get full text
Thesis -
9
Security in robot operating system (ROS) by using Advanced Encryption Standard (AES)
Published 2018“…In particular, this research focuses on using encryption algorithm which is AES. The encryption algorithm will be evaluated according to the performance of the system, both from computing and communications point of view.…”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
10
SWAT and ANN model hydrological assessment using Malaysia soil data / Khairi Khalid
Published 2017“…There were two sets of algorithms in developing the UPLRB ANN model and every algorithm set consisted of model inputs data preparation, neural network script and neural network error checking measures. …”
Get full text
Get full text
Thesis -
11
Enhancing quality of service in Multi-Radio Multi-Channel Wireless Mesh Networks
Published 2023“…Striking the right balance between coverage, capacity, and interference management requires scalable load-balancing algorithms. …”
Get full text
Get full text
Get full text
Thesis -
12
Optimization of hydropower reservoir system using genetic algorithm for various climatic scenarios
Published 2015“…By using the daily observed data, ANN can map the relationship between rainfall-runoff. …”
Get full text
Get full text
Get full text
Thesis -
13
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…However, the insecure nature of IoT devices has led to several difficulties, one of which is distributed denial-of-service (DDoS) attacks. IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. …”
Get full text
Get full text
Get full text
Article -
14
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…However, the insecure nature of IoT devices has led to several difficulties, one of which is distributed denial-of-service (DDoS) attacks. IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. …”
Get full text
Get full text
Get full text
Article -
15
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…However, the insecure nature of IoT devices has led to several difficulties, one of which is distributed denial-of-service (DDoS) attacks. IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. …”
Get full text
Get full text
Get full text
Article -
16
DC-based PV-powered home energy system
Published 2017“…For more accurate mathematical representation for the empirical outcome power data, a mathematical model based on Bode Equations and Vector Fitting algorithm has been proposed to govern the load power profile of the proposed system. …”
Get full text
Get full text
Thesis -
17
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…The second agent is a reliability evaluation agent that uses a recursive algorithm to predict the suitability generator based on the frequency and duration reliability indices in each state while the third agent is the storage and transfer of data between the other two agents. …”
Get full text
Get full text
Thesis -
18
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…However, the insecure nature of IoT devices has led to several difficulties, one of which is distributed denial-of-service (DDoS) attacks. IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. …”
Get full text
Get full text
Get full text
Article -
19
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…However, the insecure nature of IoT devices has led to several difficulties, one of which is distributed denial-of-service (DDoS) attacks. IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. …”
Get full text
Get full text
Get full text
Article -
20
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…However, the insecure nature of IoT devices has led to several difficulties, one of which is distributed denial-of-service (DDoS) attacks. IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. …”
Get full text
Get full text
Get full text
Article
