Search Results - (( normal distribution model algorithm ) OR ( based evaluation model algorithm ))

Search alternatives:

Refine Results
  1. 1

    The effect of dose calculation algorithms on the normal tissue complication probability values of thoracic cancer by Ahmad, Noor Ashikin

    Published 2015
    “…Four treatment plans are created and DVHs are evaluated based on criteria of acceptance level. NTCP values for thorax plan one and two are evaluated by using different algorithm. …”
    Get full text
    Get full text
    Monograph
  2. 2

    Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah by Abdullah, Mohd Azrul

    Published 2015
    “…Empirical cumulative distribution function (CDF) model is presented in evaluating the real traffic distribution. …”
    Get full text
    Get full text
    Article
  3. 3

    Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah by Abdullah, Mohd Azrul

    Published 2015
    “…Empirical cumulative distribution function (CDF) model is presented in evaluating the real traffic distribution. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network by Abu-Khadrah, Ahmed Ismail Mohammad

    Published 2017
    “…The OPNET simulator and the mathematical model were used to evaluate the performance for the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Dynamic robust bootstrap method based on LTS estimators by Midi, Habshah, Uraibi, Hassan Sami, Al-Talib, Bashar Abdul Aziz Majeed

    Published 2009
    “…In order to make reliable inferences about the parameters of a model, require that the parameter estimates are normally distributed. …”
    Get full text
    Get full text
    Article
  6. 6

    Optimal network reconfiguration and intelligent service restoration prediction technique based on Cuckoo search spring algorithm / Mohamad Izwan Zainal by Zainal, Mohamad Izwan

    Published 2022
    “…In this research, Cuckoo Search Spring Algorithm (CSSA) is proposed to enhance the robustness of algorithm by constructing the optimal network reconfiguration consist of reducing power losses and improve voltage profile with the various loadability factor as the constraint according to load profile, based on single and multiobjective model. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Peak pressure analysis of foot plantar distribution based on image processing algorithm by Sabry, Ali Hussein

    Published 2018
    “…The other main goal of this work is to create an algorithm which has the ability to formulate accurately and reliably the distribution of pressure over the foot plantar. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Quaternion-based dynamic algorithm for random generation of solid 4D cylindrical curves in RVE modeling by Hamat, Sanusi, Ishak, Mohamad Ridzwan, Kelly, Piaras, Salit, Mohd Sapuan, Yidris, Noorfaizal, Ali, Syamir Alihan Showkat, Hussin, Mohd Sabri, Mohd Dawi, Mohd Syedi Imran

    Published 2025
    “…A quaternion‐based dynamic algorithm is developed to populate Representative Volume Elements (RVEs) with solid 4D cylindrical fibers, combining spatial centerline coordinates (x,y,z) and quaternion‐encoded orientation. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Robust Kernel Density Function Estimation by Dadkhah, Kourosh

    Published 2010
    “…The efficiency of the modified mutual information estimate is evaluated based on its accuracy. To do this evaluation, the mixtures of bivariate normal distribution with different percentage of contribution are simulated. …”
    Get full text
    Get full text
    Thesis
  10. 10

    ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs by Khan, T., Singh, K., Hasan, M.H., Ahmad, K., Reddy, G.T., Mohan, S., Ahmadian, A.

    Published 2021
    “…However, a trust-based attack detection algorithm (TADA) assesses the reliability of SNs to detect internal attacks. …”
    Get full text
    Get full text
    Article
  11. 11

    REGION-BASED ADAPTIVE DISTRIBUTED VIDEO CODING CODEC by ABDELRAHMAN ELAMIN, ABDELRAHMAN ELAMIN

    Published 2011
    “…Although the performance evaluations show rate-penalty but it is acceptable considering the simplicity of the proposed algorithm. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Statistical monitoring of supplier performance in a quality management system environment for the Iranian automotive industry by Darestani, Soroush Avakh

    Published 2010
    “…Furthermore, the exploratory product audit method (PQAS) was developed based on normal distribution so as to quantify supplier’s quality. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Face recognition for varying illumination and different optical zoom using a combination of binary and geometric features by Khalid, Fatimah, Amjeed, Noor, O.K. Wirza, Rahmita Wirza, Madzin, Hizmawati, Azizan, Illiana

    Published 2020
    “…Therefore, this study proposed to combine the strength normalization and feature-based method to build an illumination distribution model to overcome this problem. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Termite mounds morphometry in predicting groundwater potentiality using geospatial technology by Bala, Ahmed Jamilu

    Published 2020
    “…The aim of this study therefore, is to develop a groundwater potential model in Geographical Information System (GIS) and evaluate the prospect of termite mounds in predicting suitable zones for groundwater development. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Channel Modelling and Estimation in Multiple-Input Multiple-Output Orthogonal Frequency Division Multiplexing Wireless Communication Systems by Hezam, Mohammed Abdo Saeed

    Published 2008
    “…New time-domain (TD) adaptive estimation methods based on recursive least squares (RLS) and normalized least-mean squares (NLMS) algorithms are proposed. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution / Nor Azura Ayop by Ayop, Nor Azura

    Published 2016
    “…Log likelihood estimation technique is used to fit the best 2-parameter CDF compared to Weibull, Normal and Rician distribution model. The percentage level 5% under original bandwidth used is developed on policing and shaping algorithms to control bandwidth used. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Formulating the plastic deformation expression on coated substrate as a coating selection tool by Muniandy, Nagentrau

    Published 2017
    “…The effect of coating parameters on stress-strain distributions along with plastic deformation of the coated substrate are evaluated. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Development Of Finite Element Codes For Shear Wall Analysis by Paknahad, Masoud

    Published 2008
    “…Moreover, the stress distribution evaluated by the developed FE code based on MOPT element formulation with coarse FE mesh, agrees well with the stress distributions given by the commercial packages where fine mesh was used. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution: article / Nor Azura Ayop by Ayop, Nor Azura

    Published 2016
    “…Log likelihood estimation technique is used to fitted the best 2-parameter CDF compared to WeibuII, Normal and Rician distribution model. The percentage level 5% under original bandwidth used is developed on policing and shaping algorithms to control bandwidth used. …”
    Get full text
    Get full text
    Article