Search Results - (( its application new algorithm ) OR ( model application using algorithm ))*
Search alternatives:
- model application »
- its application »
- application new »
- using algorithm »
- new algorithm »
-
1
-
2
A modified generalized RBF model with EM-based learning algorithm for medical applications
Published 2006“…Moreover, GRBF trained by the new algorithm has an apparent statistical meaning. …”
Get full text
Get full text
Get full text
Proceeding Paper -
3
-
4
DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS
Published 2012“…The issue is not only to develop new algorithms, but also to evaluate them on an experimental computational grid, using synthetic and real workload traces, along with the other existing job scheduling algorithms. …”
Get full text
Get full text
Thesis -
5
Enhanced algorithms for three-dimensional object interpreter
Published 2004Get full text
Get full text
Get full text
Thesis -
6
New approach of cryptography algorithm for e- mail applications
Published 2005“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Conference or Workshop Item -
7
Real time nonlinear filtered-x lms algorithm for active noise control
Published 2012“…The developed THF-NLFXLMS algorithm is tested by means of simulation and implemented experimentally using FPGA-based real time controller for a nonlinear ANC application. …”
Get full text
Get full text
Thesis -
8
-
9
Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff
Published 2014“…We introduce a new algorithm that could detect fraud activities in telecommunication industry (e.g. intrusion fraud which occurs when legitimate account is comprised by an intruder who makes or sells calls on this account) that uses Gaussian Mixed Model (or GMM), a probabilistic model normally used in fraud detection via speech recognition. …”
Get full text
Get full text
Get full text
Thesis -
10
Implementation of repetitive control algorithm in reducing vibration using MATLAB/SIMULINK / Mohamad Zuhairy Mohamed
Published 2008“…As a new result it is in fact shown that the algorithm iteratively solves a Model Predictive Control related cost function. …”
Get full text
Get full text
Student Project -
11
-
12
Advances of metaheuristic algorithms in training neural networks for industrial applications
Published 2023Article -
13
-
14
Development of a building energy analysis package (BEAP) and its application to the analysis of cool thermal energy storage systems
Published 2001“…Their potential for capital and operating cost savings is investigated using simplified economic analyses. A library building is used as a simulation model to demonstrate the application of the new package for simulating CTES systems. …”
Get full text
Get full text
Thesis -
15
All-pass filtered x least mean square algorithm for narrowband active noise control
Published 2018“…Recently several new ANC algorithms have been developed; in which there is no requirement for the modelling of the secondary path transfer function. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Thesis -
17
LASSO-type estimations for threshold autoregressive and heteroscedastic time series models.
Published 2020“…We extend the application of the adaptive LASSO via the CGD algorithm for the multivariate Baba-Engle-Kroner-Kraft (BEKK) ARCH/GARCH, our fourth model. …”
Get full text
Get full text
UMK Etheses -
18
Efficient prime-based method for interactive mining of frequent patterns.
Published 2011“…During the mining process, the mining algorithm reduces the number of candidate patterns and comparisons by using a new candidate set called candidate head set and several efficient pruning techniques. …”
Get full text
Get full text
Article -
19
Text spam messages classification using Artificial Immune System (AIS) algorithms
Published 2024thesis::master thesis -
20
Voting algorithms for large scale fault-tolerant systems
Published 2011“…Using a proper test-bed, after 10000 run times, we compared our newly proposed algorithm with the basic algorithm in terms of reliability and availability. …”
Get full text
Get full text
Thesis
