Search Results - (( property distribution based algorithm ) OR ( data distribution using algorithm ))

Refine Results
  1. 1

    Estimation Of Weibull Parameters Using Simulated Annealing As Applied In Financial Data by Hamza, Abubakar

    Published 2023
    “…The finding reveals that the Weibull distribution is well-suited to describing the investment behaviour of the MPS based on the estimates via the SA algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Development of classification model between clean water and polluted water based on capacitance properties using Levenberg Marquardt (LM) algorithm of artificial neural network / M... by Mohamad Salehuddin, Mohamad Firdaus

    Published 2020
    “…For both cases, the statistical analysis data show that the p-value is more than 0.05, which indicates that the data are normally distributed. …”
    Get full text
    Get full text
    Student Project
  3. 3

    Extreme air pollutant data analysis using classical and Bayesian approaches by Mohd Amin, Nor Azrita

    Published 2015
    “…Generalized extreme value (GEV) distribution and generalized Pareto (GP) distribution are two main models in EV theory based on block maxima and threshold exceedances approaches. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Poisson Transmuted Exponential Distribution For Count Data With Skewed, Dispersed And Excess Zero by Ademola Abiodun, Adetunji

    Published 2024
    “…Different Moment-Based Mathematical Properties Of The New Proposed Distributions Are Obtained. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A cluster-based hybrid replica control protocol for high availability in data grid by Mabni, Zulaile

    Published 2019
    “…In Data Grid, data replication is a widely used technique for managing data, where exact copies of data or replicas are created and stored at many distributed sites. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem by Mohd Pozi, Muhammad Syafiq

    Published 2016
    “…There are two methods in dealing with imbalanced classification problem, which are based on data or algorithmic level. Data level based methods are meant to solve the imbalanced classification problem based on the idea of making both classes equal in number. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Efficient genetic partitioning-around-medoid algorithm for clustering by Garib, Sarmad Makki Mohammed

    Published 2019
    “…One of the main issues in genetic k-means based algorithms is their sensitivity to outliers and unevenly distributed clusters due to the mean compromised computations. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Modifying maximum likelihood test for solving singularity and outlier problems in high dimensional cases by Hafeez, Ahmad

    Published 2021
    “…This study suggested to replace the classical estimators with MLw estimator due to its good properties. On the other hand, several shortcomings such as inconsistency under normal distribution, based on small sample size with large variables in high dimensions were discovered. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Predicting the popularity of tweets using the theory of point processes. by Tan, Wai Hong

    Published 2019
    “…The knowledge is combined using a novel empirical Bayes type approach, where the prior distribution for the model parameter is constructed based on the external knowledge, and the likelihood is calculated based on the internal knowledge. …”
    Get full text
    Get full text
    UMK Etheses
  11. 11
  12. 12

    Enhanced Image Classification for Defect Detection on Solar Photovoltaic Modules by Wiliani, Ninuk

    Published 2023
    “…The second algorithm uses K Nearest Neighbour using a ratio of training data and testing data of 95:05 resulting in an accuracy value of 62%. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Just Queuing: Policy-Based Scheduling Mechanism for Packet Switching Networks by Miaji, Yaser Shamsulhak A

    Published 2011
    “…The proposed mechanism is validated by using the emulation and the validation experiments involve real router flow data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Load-Balancing Models for Scheduling Divisible Load on Large Scale Data Grids by Abduh Kaid, Monir Abdullah

    Published 2009
    “…In many data grid applications, data can be decomposed into multiple independent sub datasets and distributed for parallel execution. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Predictive Framework for Imbalance Dataset by Megat Norulazmi, Megat Mohamed Noor

    Published 2012
    “…Properties of the proposed framework include; developing an approach to correlate materials defects, developing an approach to represent data attributes features, analyzing various ratio and types of data re-sampling, analyzing the impact of data dimension reduction for various data size, and partitioning data size and algorithmic schemes against the prediction performance. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    White root disease auto-detection system for rubber trees based on dynamic electro-biochemical latex properties / Mohd Suhaimi Sulaiman by Sulaiman, Mohd Suhaimi

    Published 2019
    “…All of the measurement inputs from the experiment were tested for the data distribution and discrimination between the conditions of the latex using statistical analysis. …”
    Get full text
    Get full text
    Thesis
  17. 17

    The Rise of Blockchain Internet of Things (BIoT): Secured, Device-to-Device Architecture and Simulation Scenarios by Arun Rana, Sharad Sharma, Kashif Nisar, Ag. Asri Ag. Ibrahim, Sachin Dhawan, Bhawani Chowdhry, Samreen Hussain, Nitin Goyal

    Published 2022
    “…To encrypt the elliptical curve cryptographic (ECC) and to generate keys, the Chinese remainder theorem (CRT)-based scheme is proposed and compared with the secure hash algorithm (SHA-256). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Multi-objective flow measurement in software defined networks (SDN) for datacenter / Hamid Tahaei by Hamid , Tahaei

    Published 2018
    “…The verification of both experiments is made with current state-of-the-art algorithms. To validate the simulation results, an available dataset from a public datacentre was used. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Software agent as an effective tool for managing the Internet of thing data complexity by Mustafa, M.B., Yusoof, M.A.M.

    Published 2017
    “…Software agent-based middleware in IoT can facilitate injection and distribution through the network using mobile agents, allowing the tool to manage very large data. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Rockfall hazard assessment based on airborne laser scanning data and GIS in tropical region by Fanos, Ali Mutar

    Published 2016
    “…An airborne laser scanner (ALS) was used to gather high-density data point (3-4 pts/m²). …”
    Get full text
    Get full text
    Thesis