Search Results - (( normal distribution from algorithm ) OR ( parameter evaluation method algorithm ))
Search alternatives:
- parameter evaluation »
- distribution from »
- method algorithm »
- from algorithm »
-
1
Confidence intervals (CI) for concentration parameter in von Mises distribution and analysis of missing values for circular data / Siti Fatimah binti Hassan
Published 2015“…For example, the distribution analogues to the normal distribution in linear data is known as circular normal distribution. …”
Get full text
Get full text
Thesis -
2
Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah
Published 2015“…Based on the identified statistical parameters, a new Time Based Policing and Shaping algorithm is developed and simulated. …”
Get full text
Get full text
Article -
3
Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah
Published 2015“…Based on the identified statistical parameters, a new Time Based Policing and Shaping algorithm is developed and simulated. …”
Get full text
Get full text
Thesis -
4
Nomadic people optimizer (NPO) for large-scale optimization problems
Published 2019“…A Wilcoxon Signed-Rank Test was performed to measure the pair-wise statistical performances of the algorithms and from the results, NPO recorded a better statistical performance compared to the other benchmarking algorithms. …”
Get full text
Get full text
Thesis -
5
REGION-BASED ADAPTIVE DISTRIBUTED VIDEO CODING CODEC
Published 2011“…Although the performance evaluations show rate-penalty but it is acceptable considering the simplicity of the proposed algorithm. …”
Get full text
Get full text
Thesis -
6
Optimal performance of stand-alone hybrid microgrid systems based on integrated techno-economic-environmental energy management strategy using the grey wolf optimizer
Published 2024“…This study gives a more detailed plan for evaluating the effectiveness of hybrid Microgrid systems from a technical, economic, and environmental perspective.…”
Get full text
Get full text
Get full text
Article -
7
Inversion of 2D and 3D DC resistivity imaging data for high contrast geophysical regions using artificial neural networks / Ahmad Neyamadpour
Published 2010“…One common method to obtain the true resistivity distribution is by inverting the apparent resistivity values. …”
Get full text
Get full text
Thesis -
8
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
9
Parameter extraction of photovoltaic module using hybrid evolutionary algorithm
Published 2023Conference Paper -
10
Taguchi-Grey Relational Analysis Method for Parameter Tuning of Multi-objective Pareto Ant Colony System Algorithm
Published 2023“…The gray relational grade (GRG) performance metric and the Friedman test were used to evaluate the algorithm’s performance. The Taguchi-GRA method that produced the new values for the algorithm’s parameters was shown to be able to provide a better multi-objective generator maintenance scheduling (GMS) solution. …”
Get full text
Get full text
Get full text
Article -
11
Evaluation of lightning current parameters using measured lightning induced voltage on distribution power lines
Published 2019“…In this paper, an algorithm had been proposed to evaluate the lightning current parameters using measured voltage from overhead distribution lines based on lightning location obtained from lightning location system. …”
Get full text
Get full text
Conference or Workshop Item -
12
Inversed Control Parameter in Whale Optimization Algorithm and Grey Wolf Optimizer for Wrapper-Based Feature Selection: A Comparative Study
Published 2023“…This comparative study aims to investigate and compare the effectiveness of the inversed control parameter in the proposed methods against the original algorithms in terms of the number of selected features and the classification accuracy. …”
Get full text
Get full text
Article -
13
Inversed Control Parameter in Whale Optimization Algorithm and Grey Wolf Optimizer for Wrapper-Based Feature Selection: A Comparative Study
Published 2023“…This comparative study aims to investigate and compare the effectiveness of the inversed control parameter in the proposed methods against the original algorithms in terms of the number of selected features and the classification accuracy. …”
Get full text
Get full text
Article -
14
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Monograph -
15
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…These results indi�cate that the proposed method can improve the RAN learning algorithm towards the large-scale stream data processing. …”
Get full text
Get full text
Thesis -
16
Evaluation of Lightning Current Using Inverse Procedure Algorithm.
Published 2013“…The proposed method considers on all electromagnetic fields components and can evaluate full shape of current, velocity and constant parameters of current models in contrast with previous studies. …”
Get full text
Get full text
Article -
17
Tree-based contrast subspace mining method
Published 2020“…Then, the tree-based method, the genetic algorithm based parameter values identification of tree-based method, and followed by the genetic algorithm based tree-based method, for numerical data sets are developed and evaluated. …”
Get full text
Get full text
Get full text
Thesis -
18
Evaluation of lightning current parameters using measured lightning induced voltage on distribution power lines
Published 2023Conference Paper -
19
Evaluating power efficient algorithms for efficiency and carbon emissions in cloud data centers: a review
Published 2015“…The three algorithms are evaluated for performance using three parameters; power efficiency, cost effectiveness, and amount of CO2 emissions. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
20
Performance evaluation of symmetric cryptography algorithm for database system / Mariam Azwa Yazid
Published 2015“…Cryptography has been proven to be the best method to secure a database. However there are many types of cryptography algorithm that has been established in the market. …”
Get full text
Get full text
Thesis
