Search Results - (( wave applications interface algorithm ) OR ( parameter estimation bayes algorithm ))

Refine Results
  1. 1

    Machine-learning-based adaptive distance protection relay to eliminate zone-3 protection under-reach problem on statcom-compensated transmission lines by Aker, Elhadi Emhemed Alhaaj Ammar

    Published 2020
    “…The prior result from the Matlab model of the adaptive numerical distance relay connected on midpoint integrated STATCOM power grid system indeed establish the existence of the under-reach effect for the relay zone-3 elements ing far-end short circuit fault at the coverage boundary leading to wrong impedance estimation. The BayesNet provides the best integrated MLADR fault classifier model better at a 5 % significance level than other deployed algorithms in the intelligent supervised learning model realization. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Parameter estimation of Kumaraswamy Burr type X models based on cure models with or without covariates by Yusuf, Madaki Umar

    Published 2017
    “…In this thesis, we considered two methods via the classical maximum likelihood estimation (MLE) and the Bayes estimation using the Gibbs sampling (G-S) algorithm to estimate the parameters of BKBX, KBX and Beta-Weibull (BWB) models. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Brain computer interface design and applications: challenges and future by Alwasiti, Haider Hussein, Aris, Ishak, Jantan, Adznan

    Published 2010
    “…Successful Brain Computer Interface (BCI) systems have many potential applications, especially for patients who are paralyzed. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Predicting the popularity of tweets using the theory of point processes. by Tan, Wai Hong

    Published 2019
    “…The mode of the posterior distribution is used as the estimator of the finite-dimensional parameter, and suitable functionals of the predictive distribution for the number of retweets implied by the estimated model are used to predict the tweet popularity. …”
    Get full text
    Get full text
    UMK Etheses
  7. 7
  8. 8

    Analysing the performance of classification algorithms on diseases datasets by Lydia E.L., Sharmil N., Shankar K., Maseleno A.

    Published 2023
    “…The proposed classification algorithms measure the diseases using the disease datasets which estimates the accurate prediction. …”
    Article
  9. 9
  10. 10

    Evaluation of Current Music Synthesis Software for Rendering of Various Synthesis Algorithms by Tan, Julie Lee Mei

    Published 2000
    “…The ability to distinguish the usefulness of currently available music synthesis software for the application of various synthesis algorithms is the main focus of the research. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Parallel implementation of complexity reduction approach to fourth order approximation on 2D free space wave propagation. by Hasan, Mohammad Khatim, Othman, Mohamed, Abbas, Zulkifly, Sulaiman, Jumat, Ahmad, Fatimah

    Published 2008
    “…In this paper we solve 2D wave propagation problems on a Symmetrical Multiprocessor machine using message-passing interface. …”
    Get full text
    Get full text
    Article
  13. 13

    Automatic mapping of concrete strength in structural element by Hamid, Roszilah, Mohamed, Ramizi, Mohd. Nayan, Khairul Anuar, Osman, Siti Aminah, Mohd. Yusof, Kamarudin

    Published 2006
    “…The impact generates stress wave, which propagate through the concrete. The accelerometer receives the wave and changes the display from time to frequency domain. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15
  16. 16

    Secured mobile transaction using NFC Technology: Top-Up printing system by Ayu, Media Anugerah, Mantoro, Teddy, Brotosaputro, Gunawan, Ain, Nur F., Ghazali, Noorzalina

    Published 2011
    “…As for the security measurement, MD5 algorithm is implemented to accept the system authorization. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  17. 17

    NFC secured online transaction in mobile computing business by Mantoro, Teddy, Ayu, Media Anugerah, Brotosaputro, Gunawan, Ain, Nur F., Ghazali, Noorzalina

    Published 2012
    “…As for the security measurement, MD5 algorithm is implemented to process the system authorization. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Mining The Basic Reproduction Number (R0) Forecast For The Covid Outbreak by Rajogoval, Illayakantthan

    Published 2022
    “…Existing studies applied different models including SIR, SIRD, SEIR, SPIR, MCMC, Statistical exponential growth, statistical likelihood estimation and dynamic transmission models to evaluate COVID-19 R0. …”
    Get full text
    Get full text
    Monograph
  20. 20