Search Results - (( normal distribution model algorithm ) OR ( based evaluation model algorithm ))
Search alternatives:
- based evaluation »
- model algorithm »
-
1
The effect of dose calculation algorithms on the normal tissue complication probability values of thoracic cancer
Published 2015“…Four treatment plans are created and DVHs are evaluated based on criteria of acceptance level. NTCP values for thorax plan one and two are evaluated by using different algorithm. …”
Get full text
Get full text
Monograph -
2
Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah
Published 2015“…Empirical cumulative distribution function (CDF) model is presented in evaluating the real traffic distribution. …”
Get full text
Get full text
Article -
3
Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah
Published 2015“…Empirical cumulative distribution function (CDF) model is presented in evaluating the real traffic distribution. …”
Get full text
Get full text
Thesis -
4
Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network
Published 2017“…The OPNET simulator and the mathematical model were used to evaluate the performance for the proposed algorithm. …”
Get full text
Get full text
Get full text
Thesis -
5
Dynamic robust bootstrap method based on LTS estimators
Published 2009“…In order to make reliable inferences about the parameters of a model, require that the parameter estimates are normally distributed. …”
Get full text
Get full text
Article -
6
Optimal network reconfiguration and intelligent service restoration prediction technique based on Cuckoo search spring algorithm / Mohamad Izwan Zainal
Published 2022“…In this research, Cuckoo Search Spring Algorithm (CSSA) is proposed to enhance the robustness of algorithm by constructing the optimal network reconfiguration consist of reducing power losses and improve voltage profile with the various loadability factor as the constraint according to load profile, based on single and multiobjective model. …”
Get full text
Get full text
Thesis -
7
Peak pressure analysis of foot plantar distribution based on image processing algorithm
Published 2018“…The other main goal of this work is to create an algorithm which has the ability to formulate accurately and reliably the distribution of pressure over the foot plantar. …”
Get full text
Get full text
Get full text
Thesis -
8
Quaternion-based dynamic algorithm for random generation of solid 4D cylindrical curves in RVE modeling
Published 2025“…A quaternion‐based dynamic algorithm is developed to populate Representative Volume Elements (RVEs) with solid 4D cylindrical fibers, combining spatial centerline coordinates (x,y,z) and quaternion‐encoded orientation. …”
Get full text
Get full text
Get full text
Article -
9
Robust Kernel Density Function Estimation
Published 2010“…The efficiency of the modified mutual information estimate is evaluated based on its accuracy. To do this evaluation, the mixtures of bivariate normal distribution with different percentage of contribution are simulated. …”
Get full text
Get full text
Thesis -
10
ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs
Published 2021“…However, a trust-based attack detection algorithm (TADA) assesses the reliability of SNs to detect internal attacks. …”
Get full text
Get full text
Article -
11
REGION-BASED ADAPTIVE DISTRIBUTED VIDEO CODING CODEC
Published 2011“…Although the performance evaluations show rate-penalty but it is acceptable considering the simplicity of the proposed algorithm. …”
Get full text
Get full text
Thesis -
12
Statistical monitoring of supplier performance in a quality management system environment for the Iranian automotive industry
Published 2010“…Furthermore, the exploratory product audit method (PQAS) was developed based on normal distribution so as to quantify supplier’s quality. …”
Get full text
Get full text
Thesis -
13
Face recognition for varying illumination and different optical zoom using a combination of binary and geometric features
Published 2020“…Therefore, this study proposed to combine the strength normalization and feature-based method to build an illumination distribution model to overcome this problem. …”
Get full text
Get full text
Get full text
Article -
14
Termite mounds morphometry in predicting groundwater potentiality using geospatial technology
Published 2020“…The aim of this study therefore, is to develop a groundwater potential model in Geographical Information System (GIS) and evaluate the prospect of termite mounds in predicting suitable zones for groundwater development. …”
Get full text
Get full text
Thesis -
15
Channel Modelling and Estimation in Multiple-Input Multiple-Output Orthogonal Frequency Division Multiplexing Wireless Communication Systems
Published 2008“…New time-domain (TD) adaptive estimation methods based on recursive least squares (RLS) and normalized least-mean squares (NLMS) algorithms are proposed. …”
Get full text
Get full text
Thesis -
16
Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution / Nor Azura Ayop
Published 2016“…Log likelihood estimation technique is used to fit the best 2-parameter CDF compared to Weibull, Normal and Rician distribution model. The percentage level 5% under original bandwidth used is developed on policing and shaping algorithms to control bandwidth used. …”
Get full text
Get full text
Thesis -
17
Formulating the plastic deformation expression on coated substrate as a coating selection tool
Published 2017“…The effect of coating parameters on stress-strain distributions along with plastic deformation of the coated substrate are evaluated. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Development Of Finite Element Codes For Shear Wall Analysis
Published 2008“…Moreover, the stress distribution evaluated by the developed FE code based on MOPT element formulation with coarse FE mesh, agrees well with the stress distributions given by the commercial packages where fine mesh was used. …”
Get full text
Get full text
Thesis -
19
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
20
Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution: article / Nor Azura Ayop
Published 2016“…Log likelihood estimation technique is used to fitted the best 2-parameter CDF compared to WeibuII, Normal and Rician distribution model. The percentage level 5% under original bandwidth used is developed on policing and shaping algorithms to control bandwidth used. …”
Get full text
Get full text
Article
