Search Results - (( normal distribution selection algorithm ) OR ( parallel optimization path algorithm ))

Refine Results
  1. 1

    Tool path generation of contour parallel based on ant colony optimisation by Abdullah, Haslina, Ramli, Rizauddin, Abd Wahab, Dzuraidah, Abu Qudeiri, Jaber

    Published 2016
    “…An Ant Colony Optimisation (ACO) method is used to optimize the tool path length because of its capability to find the shortest tool path length. …”
    Get full text
    Get full text
    Article
  2. 2
  3. 3
  4. 4

    Restoration planning strategy of transmission system based on optimal energizing time of sectionalizing islands / Dian Najihah Abu Talib by Dian Najihah , Abu Talib

    Published 2019
    “…There are two discrete optimization techniques used in this work, which are the Artificial Bee Colony algorithm and Evolutionary Programming. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Dynamic Robust Bootstrap Algorithm for Linear Model Selection Using Least Trimmed Squares by Uraibi, Hassan Sami

    Published 2009
    “…One of the important assumptions of the linear model is that the error terms are normally distributed. Unfortunately, many researchers are not aware that the performance of the OLS can be very poor when the data set that one often makes a normal assumption, has a heavy-tailed distribution which may arise as a result of the presence of outliers. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Development of classification model between clean water and polluted water based on capacitance properties using Levenberg Marquardt (LM) algorithm of artificial neural network / M... by Mohamad Salehuddin, Mohamad Firdaus

    Published 2020
    “…For both cases, the statistical analysis data show that the p-value is more than 0.05, which indicates that the data are normally distributed. These measurement inputs were then going through the process of classification in ANN to generate the optimized models by using LM algorithm. …”
    Get full text
    Get full text
    Student Project
  7. 7

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…The focus of this analysis is on original observations that performed a detecting outlier and power transformation to transform not normally distributed data to near normality. The correlation of each system calls are examined using coefficient correlations of each selected system call variables. …”
    Get full text
    Get full text
    Thesis
  8. 8

    A novel large-bit-size architecture and microarchitecture for the implementation of Superscalar Pipeline VLIW microprocessors by Lee, Weng Fook

    Published 2008
    “…Different adder architectures are investigated for suitability on synthesis implementation of large data bus size adder for efficient usage within the ALU. An adder algorithm using repetitive constructs in a parallel algorithm that allows for efficient and optimal synthesis for large data bus size is proposed as a suitable implementation for the adder within the ALU. …”
    Get full text
    Thesis
  9. 9

    Investigation of evolutionary multi-objective algorithms in solving view selection problem / Seyed Hamid Talebian by Talebian, Seyed Hamid

    Published 2013
    “…In addition to the normal metrics, the computational time for executing each algorithm was also measured and compared. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…The focus of this analysis is on original observations that performed a detecting outlier and power transformation to transform not normally distributed data to near normality. The correlation of each system calls are examined using coefficient correlations of each selected system call variables. …”
    Get full text
    Monograph
  11. 11

    The comparison of tardiness in scheduling techniques for task distribution using grid simulation tool by Stapa @ Mustapa, Muhamad Azhar

    Published 2008
    “…The goal of this project is to test on tardiness parameter in local search based algorithms. A good scheduling algorithm normally shows lower value of total tardiness and schedule time. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    An enhanced cluster head selection algorithm for routing in mobile AD-HOC network by Abdulsaheb, Ghaida Muttasher

    Published 2017
    “…This thesis proposes an algorithm for increasing the stability of the cluster by selecting the most stable cluster head, maintaining the cluster structure with minimum maintenance overhead, and finding the best performance routing algorithm for use over MANET. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Identification of non-equilibrium growth for bitcoin exchange rate: mathematical derivation method in Islamic financial engineering by Rosbi, Sofian, Abu Bakar, Nashirah

    Published 2017
    “…Graphical method indicates the first difference of data distribution is a non-normal distribution. Then, Shapiro-Wilk statistical test confirmed that first difference of data distribution deviate from normal distribution. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15
  16. 16

    Fault identification in pipeline system using normalized hilbert huang transform and automatic selection of intrinsic mode function by Hanafi, M. Yusop, M. F., Ghazali, M. F. M., Yusof, M. A., Pi Remli

    Published 2018
    “…Normalized Ikaz is recommended and advised to be implemented as automatic selection of intrinsic mode function (IMF) through NHHT analysis.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Optimal network reconfiguration and intelligent service restoration prediction technique based on Cuckoo search spring algorithm / Mohamad Izwan Zainal by Zainal, Mohamad Izwan

    Published 2022
    “…Modern distribution network is a complex network due to load demand varies and normally designed in radial circuit in which the circuit has ready to close switch at the end of the circuit when the situation needed. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A 'snowflake' geometrical representation for optimised degree six 3-modified chordal ring networks by Chien, Stephen Lim Een, Raja Maamor Shah, Raja Noor Farah Azura, Othman, Mohamed

    Published 2016
    “…A tree visualisation was constructed based on its connectivity to enable the generation of formulae for optimal diameter and average optimal path lengths. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques by Mustafa, Ahmed Sudad

    Published 2017
    “…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Omega grey wolf optimizer (ωGWO) for optimization of overcurrent relays coordination with distributed generation by Noor Zaihan, Jamal

    Published 2019
    “…The GWO algorithm is tested to four different test cases which are IEEE 3 bus (consists of six OCRs), IEEE 8 bus (consists of 14 OCRs), 9 bus (consists of 24 OCRs) and IEEE 15 bus (consists of 42 OCRs) test systems with normal inverse (NI) characteristic curve for all test cases and very inverse (VI) curve for selected cases to test the flexibility of the GWO algorithm. …”
    Get full text
    Get full text
    Thesis