Search Results - (( normal distribution rate algorithm ) OR ( parameters variation bat algorithm ))

Refine Results
  1. 1

    Assessment of energy storage and renewable energy sources-based two-area microgrid system using optimized fractional order controllers by Peddakapu, K., Mohd Rusllim, Mohamed, Srinivasarao, P., Arya, Yogendra

    Published 2024
    “…Simulation results reveal that the AOA-based CFOID-FOPIDN outperforms other existing algorithms, such as particle swarm optimization (PSO), bat algorithm (BAT), moth flame optimization (MFO), and whale optimization algorithm (WOA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Improved performance in distributed estimation by convex combination of DNSAF and DNLMS algorithms by Ahmad Pouradabi, Amir Rastegarnia, Azam Khalili, Ali Farzamnia

    Published 2022
    “…Diffusion normalized least mean square (DNLMS) algorithm has low misadjustment error, but it is slow in convergence. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  4. 4

    Identification of non-equilibrium growth for bitcoin exchange rate: mathematical derivation method in Islamic financial engineering by Rosbi, Sofian, Abu Bakar, Nashirah

    Published 2017
    “…Graphical method indicates the first difference of data distribution is a non-normal distribution. Then, Shapiro-Wilk statistical test confirmed that first difference of data distribution deviate from normal distribution. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Monograph
  6. 6

    Optimized controllers for stabilizing the frequency changes in hybrid wind-photovoltaic-wave energy-based maritime microgrid systems by Peddakapu, K., Mohd Rusllim, Mohamed, Srinivasarao, P., Licari, J.

    Published 2024
    “…The AOA-based 2DOF-TIDN performance is compared to the following algorithms: genetic, Jaya, bat, grasshopper optimization, particle swarm optimization, and moth flame optimization. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution / Nor Azura Ayop by Ayop, Nor Azura

    Published 2016
    “…Log likelihood estimation technique is used to fit the best 2-parameter CDF compared to Weibull, Normal and Rician distribution model. The percentage level 5% under original bandwidth used is developed on policing and shaping algorithms to control bandwidth used. …”
    Get full text
    Get full text
    Thesis
  8. 8

    A decomposed streamflow non-gradientbased artificial intelligence forecasting algorithm with factoring in aleatoric and epistemic variables / Wei Yaxing by Wei , Yaxing

    Published 2024
    “…Given the multitude of components to manage, streamflow forecasting is preferable to employ an algorithm with low sensitivity to parameter variations. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Early detection and mitigation of DDoS attacks in software defined networks by Al-Saadi, Mustafa Yahya Zakariya

    Published 2018
    “…Then the algorithm was tested with attack on one host and a sub net of six hosts with attack rates of25%, 50% and 75% for the first case and 50%, 75% attack rate for the subnet case. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Mitigating Unbalanced And Overlapped Problems Of Large Network Intrusion Data Using Multiplelevel Detection Techniques by Ho, Yan Bing

    Published 2022
    “…These problems have caused a low detection rate for intrusions that are the minority in data sets because learning algorithms favour the majority class (normal traffic). …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12
  13. 13

    Tasks Distribution In Driver Scheduling Using Dynamic Set Of Bandwidth In Harmony Search Algorithm With 2-Opt by Shaffiei, Zatul Alwani

    Published 2021
    “…Therefore, a tasks distribution in driver scheduling using dynamic set of bandwidth in harmony search algorithm with 2-opt (SBHS2-opt) was proposed in this research. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    A Comparative Study of Z-Score and Min-Max Normalization for Rainfall Classification in Pekanbaru by Rahmad Ramadhan, Laska, Anne Mudya, Yolanda

    Published 2024
    “…The objective is to compare various data normalization techniques, including Min-Max Normalization and Z-Score Normalization. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Lumped parameter modelling in femoral popliteal artery for normal and severe conditions by Kaha, Asrizan, Taib, Ishkrizat, Paisal, Muhammad Sufyan Amir, Tajul Arifin, Ahmad Mubarak, Ismail, Al Emran, Asmuin, Norzelawati, Abdul Haq, Reazul Haq, Chatpun, Surapong, Yamamoto, Takahisa, Osman, Kahar

    Published 2018
    “…In conclusion, the obtained waveform propagation from the linear analysis of the lumped parameter modelling shows that the periodic mean pressures and flow rate distributions in large arteries are highly depend on the resistances and the compliances. …”
    Get full text
    Get full text
    Article
  16. 16

    REGION-BASED ADAPTIVE DISTRIBUTED VIDEO CODING CODEC by ABDELRAHMAN ELAMIN, ABDELRAHMAN ELAMIN

    Published 2011
    “…Although the performance evaluations show rate-penalty but it is acceptable considering the simplicity of the proposed algorithm. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Improving resource management with multi-instance broker scheduling algorithm in hierarchical grid computing by Yahaya, Bakri

    Published 2016
    “…Results from each of the variables and algorithms had been compared and statistical methods such as the t-test and normality test were used to verify the results. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Fire severity and post-fire generation using : Landsat [NDVI], [NBR] and [SAVI] / Nur Izzaty Dali by Dali, Nur Izzaty

    Published 2018
    “…Pre-fire and post-fire of Landsat 7 ETM+ images were obtained to identify the fire severity using Normalized Burn Ratio algorithms. The objectives of this study are (1) to produce Normalized Difference Vegetation Index (NDVI), Normalized Burn Ratio (NBR), and Soil Adjusted Vegetation Index (SAVI) and (2) to determine the changes of forest distribution based on NDVI, NBR and SAVI changes. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Optimisation of distributed generation in electric power systems using fuzzy-genetic algorithm approach by Akorede, Mudathir Funsho

    Published 2011
    “…This model takes into account, the peculiarities of radial distribution networks, such as high R/X (resistance/reactance) ratio, voltage dependency and composite nature of loads.To solve the proposed models, Genetic algorithm (GA) is used as an optimisation technique. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Frequency deviations stabilizations in restructured power systems using coordinative controllers by Kurukuri, Peddakapu

    Published 2021
    “…The robustness of the suggested controller has been verified by ±25% variations in system parameters and loading conditions.…”
    Get full text
    Get full text
    Thesis