Search Results - (( data estimation method algorithm ) OR ( data protection method algorithm ))

Refine Results
  1. 1

    Robust estimation methods for fixed effect panel data model having block-concentrated outliers by Abu Bakar @ Harun, Nor Mazlina

    Published 2019
    “…The Ordinary Least Squares (OLS) is the commonly used method to estimate the parameters of fixed effect panel data model. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Simulation-Based Power Estimation for High Throughput SHA-256 Design on Unfolding Transformation by Shamsiah, Suhaili, Norhuzaimin, Julai, Asrani, Lit, Maimun Binti, Huja Hussin, Mohamad Faizrizwan bin, Mohd Sabri

    Published 2022
    “…Several cryptographic SHA-256 hash algorithms have been developed to enhance the performance of data-protection techniques. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  3. 3

    Evaluation of lightning location and lightning current wave shape using measured lightning magnetic fields at two stations by Izadi, Mahdi, Ab Kadir, Mohd Zainal Abidin, Hajikhani, Maryam, Gomes, Chandima

    Published 2016
    “…The proposed method can be helpful for creating lightning location and lightning current data banks as it can estimate the full shape of the current as opposed to the usual methods used previously.…”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    An accurate algorithm of PMU-based wide area measurements for fault detection using positive-sequence voltage and unwrapped dynamic angles by Muhammad Qasim, Khan, Musse Mohamud, Ahmed, Ahmed Mohamed, Ahmed Haidar

    Published 2022
    “…The aim is to allow accurate action-based performance for analysts in monitoring the transmission lines so that rapid actions can be taken during abnormal circumstances before the blackout occurs. Among different algorithms, this study focuses on modelling the non- recursive phasor estimation method in a power Simulink environment for a standard test system equipped with a developed algorithm to detect the fault zone. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    New approach in time domain for evaluation of electric and magnetic fields near the lightning channel by Ab Kadir, Mohd Zainal Abidin, Izadi, Mahdi

    Published 2010
    “…The electric and magnetic fields due to lightning channel can be estimated by many methods such as Finite Difference Time Domain (FDTD) and dipole methods. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    SVM, ANN, and PSF modelling approaches for prediction of iron dust minimum ignition temperature (MIT) based on the synergistic effect of dispersion pressure and concentration by Arshad, U., Taqvi, S.A.A., Buang, A., Awad, A.

    Published 2021
    “…Data-driven models for predicting fire and explosion-related properties have been improved greatly in recent years using machine-learning algorithms. …”
    Get full text
    Get full text
    Article
  7. 7

    Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching by Ei Wei., Ting, M. Z., Ibrahim, D.J., Mulvaney

    Published 2017
    “…The traditional ways that used to protect privacy such as Personal Identification Number (PIN) and smart card are getting replaced by the biometric methods due to its high risk for being forgotten and exposure. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Area-based vs tree-centric approaches to mapping forest carbon in Southeast Asian forests from airborne laser scanning data by David A. Coomes, Michele Dalponte, Tommaso Jucker, Gregory P. Asner, Lindsay F. Banin, David F.R.P. Burslem, Simon L. Lewis, Reuben Nilus, Oliver L. Phillips, Phua, Mui How, Lan Qie

    Published 2017
    “…Tree-centric modelling is appealing because it is based on summing the biomass of individual trees, but until algorithms can detect understory trees reliably and estimate biomass from crown dimensions precisely, areas-based modelling will remain the method of choice.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Investigation of dimensionality reduction in a finger vein verification system by Ting, Ei Wei, M. Z., Ibrahim, Mulvaney, D. J.

    Published 2018
    “…Popular methods of protecting access such as Personal Identification Numbers and smart cards are subject to security risks that result from accidental loss or being stolen. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Wavelet based fault tolerant control of induction motor / Khalaf Salloum Gaeid by Gaeid, Khalaf Salloum

    Published 2012
    “…The fault detection algorithm identifies the time and location of each fault. …”
    Get full text
    Get full text
    Thesis
  11. 11

    State-of-charge estimation for lithium-ion batteries with optimized self-supervised transformer deep learning model by Dickson Neoh Tze How, Dr.

    Published 2023
    “…In the first stage, the model is pre-trained using unlabeled data with unsupervised learning. In the second stage, the model is fine-tuned or re-trained using labeled data with supervised learning. …”
    text::Thesis
  12. 12

    Groundwater quality assessment and optimization of monitored wells using multivariate geostatistical techniques in Amol-Babol Plain, Iran by Narany, Tahoora Sheikhy

    Published 2015
    “…A new optimization approach was proposed for redesign monitoring network wells using optimization algorithm based on the vulnerability of aquifer to contaminations, estimation error of sampling wells, nearest distance between wells, and source of contamination in the study area. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Semiparametric inference procedure for the accelarated failure time model with interval-censored data by Karimi, Mostafa

    Published 2019
    “…The rank-based methods, estimating algorithms, and resampling techniques that are developed do not involve the difficulties of the existing estimating procedures. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Multiple equations model selection algorithm with iterative estimation method by Kamarudin, Nur Azulia, Ismail, Suzilah

    Published 2016
    “…This estimation method is equivalent to maximum likelihood estimation at convergence. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Semiparametric estimation with profile algorithm for longitudinal binary data by Suliadi, Suliadi, Ibrahim, Noor Akma, Daud, Isa

    Published 2013
    “…We use profile algorithm in the estimation of both parametric and nonparametric components. …”
    Get full text
    Get full text
    Article
  17. 17
  18. 18
  19. 19

    Robust diagnostics and variable selection procedure based on modified reweighted fast consistent and high breakdown estimator for high dimensional data by Baba, Ishaq Abdullahi

    Published 2022
    “…The simulation study results and real data sets indicate that the proposed MRFCHCS+LAD-SCAD estimator was found to be the best method compared to other methods in this study.…”
    Get full text
    Get full text
    Thesis
  20. 20

    An improved scatter search algorithm for parameter estimation in large-scale kinetic models of biochemical systems by Remli, Muhammad Akmal, Mohamad, Mohd Saberi, Deris, Safaai, Sinnott, Richard, Napis, Suhaimi

    Published 2019
    “…Methods: This paper proposes an improved scatter search algorithm to address the challenging parameter estimation problem. …”
    Get full text
    Get full text
    Get full text
    Article