Search Results - (( normal distribution system algorithm ) OR ( data distribution function algorithm ))

Refine Results
  1. 1

    Optimal network reconfiguration and intelligent service restoration prediction technique based on Cuckoo search spring algorithm / Mohamad Izwan Zainal by Zainal, Mohamad Izwan

    Published 2022
    “…In addition, objective function using the same CSSA algorithm were applied i.e., Vmin and Ploss as the objective function, and multi-objective involves Vmin and Ploss as the objective function. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah by Abdullah, Mohd Azrul

    Published 2015
    “…Empirical cumulative distribution function (CDF) model is presented in evaluating the real traffic distribution. …”
    Get full text
    Get full text
    Thesis
  3. 3

    PSO modelling and PID controlled of automatic fish feeder system by W Mahmud, Wan Muhammad Azlan

    Published 2020
    “…In this study, raw data at distribution part with speed of 130 rpm, 160 rpm, 190 rpm, 220 rpm and 250 rpm were extracted and used to determine ARX equation parameters as transfer function by using PSO algorithm to optimize ARX model parameter. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs by Khan, T., Singh, K., Hasan, M.H., Ahmad, K., Reddy, G.T., Mohan, S., Ahmadian, A.

    Published 2021
    “…ETERS utilizes the Beta distribution-based trust function because recovery of trust values under attacks is faster in Beta distribution than Gaussian and Dirichlet distribution. …”
    Get full text
    Get full text
    Article
  5. 5

    Fault identification in pipeline system using normalized hilbert huang transform and automatic selection of intrinsic mode function by Hanafi, M. Yusop, M. F., Ghazali, M. F. M., Yusof, M. A., Pi Remli

    Published 2018
    “…This paper proposed to apply Integrated Kurtosis-based Algorithm for z-filter Technique (Ikaz) for that allows automatic selection of intrinsic mode function (IMF) that’s should be used. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Automatic database of robust neural network forecasting / Saadi Ahmad Kamaruddin, Nor Azura Md. Ghani and Norazan Mohamed Ramli by Ahmad Kamaruddin, Saadi, Md. Ghani, Nor Azura, Mohamed Ramli, Norazan

    Published 2014
    “…The direct idea of making the conventional neural network learning algorithm more powerful towards outlying data is by replacing the mean square error (MSE) with a different symmetric and continuous cost function. …”
    Get full text
    Get full text
    Get full text
    Book Section
  7. 7

    Reservoir Inflow Forecasting Using Artificial Neural Network and Adaptive Neuro-Fuzzy Inference System Techniques by Googhari, Shahram Karimi

    Published 2007
    “…The reservoir inflow and rainfall data sets were examined for normal distribution and the best data transformation was used. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique by Muhammad Hanafi, Yusop

    Published 2018
    “…In a recent study, the analysis of pressure transient signals could be seen as an accurate and low-cost method for leak and feature detection in water distribution systems. Transient phenomena has occur due to the sudden changes in the fluid’s propagation in pipelines system caused by the rapid pressure and flow fluctuation. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Clustering autism spectrum disorder student’s system based on intelligence, skills and behavior using agglomerative clustering algortihm / Daarin Nadia Nordin by Nordin, Daarin Nadia

    Published 2020
    “…Data cleaning and data transformation is first carried out, followed by normalization through the Z-score method before being processed in the clustering model. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…In Chapter 2, we propose a new algorithm based on incremental Radial Basis Function Network (RBFN) to accelerate the learning in stream data. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…The focus of this analysis is on original observations that performed a detecting outlier and power transformation to transform not normally distributed data to near normality. The correlation of each system calls are examined using coefficient correlations of each selected system call variables. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…The focus of this analysis is on original observations that performed a detecting outlier and power transformation to transform not normally distributed data to near normality. The correlation of each system calls are examined using coefficient correlations of each selected system call variables. …”
    Get full text
    Monograph
  14. 14

    Optimum capacitor placement and sizing for distribution system based on an improved voltage stability index by Aman, M.M., Jasmon, G.B., Bakar, A.H.A., Mokhlis, Hazlie

    Published 2012
    “…Shunt capacitor is normally placed in the distribution system for reactive power support and voltage stability. …”
    Get full text
    Get full text
    Article
  15. 15

    JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation by Abu, Ahmad Zaidee

    Published 2008
    “…This thesis work studied on digital image encryption algorithms performed towards JPEG images. With image encryption algorithms, JPEG images can be securely scrambled or encrypted prior to distribution. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Parallel distributed computational microcontroller system for adaptive antenna downlink transmitter power optimization by Sankar K.P., Tiong S.K., Koh S.P.J.

    Published 2023
    “…Parallel Distributed Genetic Algorithm (PDGA) is employed in adaptive beam forming technique to reduce power usage of adaptive antenna at WCDMA base station. …”
    Article
  17. 17
  18. 18

    Adaptive Neural Subtractive Clustering Fuzzy Inference System for the Detection of High Impedance Fault on Distribution Power System by Tawafan, Adnan, Sulaiman , Marizan, Ibrahim, Zulkifilie

    Published 2012
    “…HIF and other operation event data were obtained by simulation of a 13.8 kV distribution feeder using PSCAD. The results show that the proposed algorithm can distinguish successfully HIFs from other events in distribution power system…”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Hierarchical Bayesian estimation for stationary autoregressive models using reversible jump MCMC algorithm by Suparman, S., Rusiman, Mohd Saifullah

    Published 2018
    “…In the hierarchical Bayesian approach, the order and coefficients of the autoregressive model are assumed to have a prior distribution. The prior distribution is combined with the likelihood function to obtain a posterior distribution. …”
    Get full text
    Article
  20. 20

    High Impedance Fault Detection on Power Distribution Feeder by Sulaiman , Marizan, Tawafan, Adnan, Ibrahim, Zulkifilie

    Published 2012
    “…HIF and other operation event data were obtained by simulation of a 13.8 kV distribution feeder using PSCAD. The results show that the proposed algorithm can distinguish successfully HIFs from other events in distribution power system.…”
    Get full text
    Get full text
    Get full text
    Article