Search Results - (( user evaluation force algorithm ) OR ( data distribution some algorithm ))*
Search alternatives:
- data distribution »
- distribution some »
- evaluation force »
- user evaluation »
- force algorithm »
- some algorithm »
-
1
A new algorithm on Graphical User Authentication (GUA) based on multi-line grids
Published 2010“…Finally, a comparison of the newly proposed algorithm and previous algorithms will be evaluated in a table.…”
Get full text
Get full text
Get full text
Article -
2
Backhaul load and performance optimality of partial joint processing schemes in LTE-A networks
Published 2014“…All these achieved because the proposed algorithm targets those users located at the cluster borders who more likely cause rank deficiency. …”
Get full text
Get full text
Thesis -
3
Dynamic replication algorithm in data grid: Survey
Published 2008“…Data replication is a common method used to improve the performance of data access in distributed systems. …”
Get full text
Get full text
Get full text
Book Section -
4
Automated negative lightning return strokes characterization using brute-force search algorithm
Published 2022“…Hence, this study proposed the development of an automated negative lightning return strokes characterization using a brute-force search algorithm. A total of 170 lightning electric field waveforms were characterized automatically using the proposed algorithm. …”
Get full text
Get full text
Get full text
Article -
5
Automated negative lightning return strokes characterization using brute-force search algorithm
Published 2022“…Hence, this study proposed the development of an automated negative lightning return strokes characterization using a brute-force search algorithm. A total of 170 lightning electric field waveforms were characterized automatically using the proposed algorithm. …”
Get full text
Get full text
Get full text
Article -
6
Automated Negative Lightning Return Strokes Characterization Using Brute-Force Search Algorithm
Published 2024Get full text
journal::journal article -
7
Securing graphical user password using multi-grid technique from shoulder surfing attack / Leila Ghasemi Sabet
Published 2010“…For security in graphical password, there are some attacks such as shoulder surfing, and brute force. Shoulder surfing is one of the major attacks; it means this project must cover the shoulder surfing attacks for making the algorithms more secure. …”
Get full text
Get full text
Thesis -
8
Two-Phases QR Authentication Algorithm (2PQRA) for Digital Energy and IoT Applications
Published 2023Conference Paper -
9
Some families of count distributions for modelling zero-inflation and dispersion / Low Yeh Ching
Published 2016“…A popular distribution for the modelling of discrete count data is the Poisson distribution. …”
Get full text
Get full text
Thesis -
10
Multi-user beamforming, fairness and device-to-device channel state information sharing in downlink non-orthogonal multiple access systems
Published 2021“…To this end, a fair user clustering algorithm with two stages is proposed, wherein the strong and weak users are selected in the first and second stages, respectively. …”
Get full text
Get full text
Thesis -
11
Improved criteria determination of an automated negative lightning return strokes characterisation using Brute-Force search algorithm
Published 2021“…Accordingly, the proposed Brute-Force search algorithm characterised the negative lightning return strokes parameters based on the seven parameters. …”
Get full text
Get full text
Thesis -
12
-
13
Real time self-calibration algorithm of pressure sensor for robotic hand glove system
Published 2019“…This provides a useful methodology for the user to evaluate the performance of any measurement system in a real-time environment.…”
Get full text
Get full text
Thesis -
14
Machine learning in botda fibre sensor for distributed temperature measurement
Published 2023“…To make the sensor more reliable, temperature data must be collected over the length of the cable, or distributed data rather than point data. …”
text::Thesis -
15
-
16
A wheelchair sitting posture detection system using pressure sensors
Published 2024“…All the classification algorithms were evaluated by using the k-fold cross validation method. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
17
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
18
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
19
The Performance of Chlorophyll-a Distribution Estimation by Using Ratio Algorithm on Landsat-8 in Sungai Merbok Estuary / Jesse Vince Rabing ... [et al.]
Published 2022“…This study explores the applicability of ratio algorithms for estimation of the chl- a concentration at Sungai Merbok by assessing chl-a distribution pattern built by the algorithms and evaluating each algorithm for their errors compared to in-situ data. …”
Get full text
Get full text
Get full text
Article -
20
A simulation study of a parametric mixture model of three different distributions to analyze heterogeneous survival data
Published 2013“…In this paper a simulation study of a parametric mixture model of three different distributions is considered to model heterogeneous survival data.Some properties of the proposed parametric mixture of Exponential, Gamma and Weibull are investigated.The Expectation Maximization Algorithm (EM) is implemented to estimate the maximum likelihood estimators of three different postulated parametric mixture model parameters.The simulations are performed by simulating data sampled from a population of three component parametric mixture of three different distributions, and the simulations are repeated 10, 30, 50, 100 and 500 times to investigate the consistency and stability of the EM scheme.The EM Algorithm scheme developed is able to estimate the parameters of the mixture which are very close to the parameters of the postulated model.The repetitions of the simulation give parameters closer and closer to the postulated models, as the number of repetitions increases, with relatively small standard errors.…”
Get full text
Get full text
Get full text
Article
