Search Results - (( normal distribution methods algorithm ) OR ( probable evaluation method algorithm ))

Refine Results
  1. 1

    The effect of dose calculation algorithms on the normal tissue complication probability values of thoracic cancer by Ahmad, Noor Ashikin

    Published 2015
    “…Purpose: To identify the effect of dose calculation algorithms on the Normal Tissue Complication Probability values of thoracic cancer. …”
    Get full text
    Get full text
    Monograph
  2. 2

    Confidence intervals (CI) for concentration parameter in von Mises distribution and analysis of missing values for circular data / Siti Fatimah binti Hassan by Hassan, Siti Fatimah

    Published 2015
    “…For example, the distribution analogues to the normal distribution in linear data is known as circular normal distribution. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Robust Kernel Density Function Estimation by Dadkhah, Kourosh

    Published 2010
    “…The distance of observations from the center of data set is incorporated in the formulation of the first outlier detection method in unimodal distribution. The second method attempts to define an approach that is useable not only for unimodal distribution but also for multimodal distribution. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Optimal performance of stand-alone hybrid microgrid systems based on integrated techno-economic-environmental energy management strategy using the grey wolf optimizer by Tukkee, Ahmed Sahib, Bin Abdul Wahab, Noor Izzri, Binti Mailah, Nashiren Farzilah, Hassan, Mohd Khair

    Published 2024
    “…The proposed strategy reduced the system’s total net present cost, power loss, and emissions by (1.06), (8.69), and (17.19), respectively compared to normal operation. Firefly Algorithm (FA) and Particle Swarm Optimization (PSO) techniques were used to verify the results. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Tree-based contrast subspace mining method by Florence Sia Fui Sze

    Published 2020
    “…Then, the tree-based method, the genetic algorithm based parameter values identification of tree-based method, and followed by the genetic algorithm based tree-based method, for numerical data sets are developed and evaluated. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…These results indi�cate that the proposed method can improve the RAN learning algorithm towards the large-scale stream data processing. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Analysis of tumour control probability, normal tissue complication probability and isotoxic effects for prostate cancer by Fauzee, Nurnada Syahrain Mohd

    Published 2016
    “…Variation in evaluation method will not give similar findings even same data is used. …”
    Get full text
    Get full text
    Monograph
  8. 8

    Modified Contrast Limited Adaptive Histogram Equalization for high dynamic range images by Tung, Li Qian

    Published 2012
    “…The generated probability map of the proposed tone mapped algorithm was then compared with the generated probability map of Ward tone mapping algorithm. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Improved performance in distributed estimation by convex combination of DNSAF and DNLMS algorithms by Ahmad Pouradabi, Amir Rastegarnia, Azam Khalili, Ali Farzamnia

    Published 2022
    “…Diffusion normalized least mean square (DNLMS) algorithm has low misadjustment error, but it is slow in convergence. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  10. 10

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Monograph
  13. 13

    Statistical approach on grading: mixture modeling by Md. Desa, Zairul Nor Deana

    Published 2006
    “…Statistical approaches which use the Standard Deviation and conditional Bayesian methods are considered to assign the grades. In the conditional Bayesian model, we assume the data to follow the Normal Mixture distribution where the grades are distinctively separated by the parameters: means and proportions of the Normal Mixture distribution. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Dynamic Robust Bootstrap Algorithm for Linear Model Selection Using Least Trimmed Squares by Uraibi, Hassan Sami

    Published 2009
    “…One of the important assumptions of the linear model is that the error terms are normally distributed. Unfortunately, many researchers are not aware that the performance of the OLS can be very poor when the data set that one often makes a normal assumption, has a heavy-tailed distribution which may arise as a result of the presence of outliers. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Dynamic robust bootstrap method based on LTS estimators by Midi, Habshah, Uraibi, Hassan Sami, Al-Talib, Bashar Abdul Aziz Majeed

    Published 2009
    “…In order to make reliable inferences about the parameters of a model, require that the parameter estimates are normally distributed. Nevertheless, in real situations, many estimates are not normal and the use of bootstrap method is more appropriate as it does not rely on the normality assumption. …”
    Get full text
    Get full text
    Article
  18. 18

    Statistical approach on grading the student achievement via normal mixture modeling by Md. Desa, Zairul Nor Deana, Mohamad, Ismail, Mohd. Khalid, Zarina, Md. Zin, Hanafiah

    Published 2006
    “…Statistical approaches which used the Standard Deviation (GC) and conditional Bayesian methods are considered to assign the grades. In the conditional Bayesian model, we assume the data to follow the Normal Mixture distribution where the grades are distinctively separated by the parameters: means and proportions of the Normal Mixture distribution. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Spam image filtering algorithm / Muhammad Hazim Shahimi by Shahimi, Muhammad Hazim

    Published 2015
    “…This project applied Optical Character Recognition (OCR) and Bayesian probability to filter the spam images. The evaluation task is done by using formula of Precision, Recall, Error Rate, and Accuracy. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Microcrack Detection And Noise Reduction In Integrated Circuit Packages by Koh, Ye Sheng

    Published 2018
    “…Three algorithms are tested and evaluated in terms of microcrack detection and noise reduction which are probability based thresholding, histogram equalization, and modified Perona-Malik’s anisotropic diffusion methods. …”
    Get full text
    Get full text
    Monograph