Search Results - normal distribution ((((issues algorithm) OR (system algorithm))) OR (based algorithm))
Search alternatives:
- issues algorithm »
- system algorithm »
-
1
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023“…This work is focused on the implementation of evolutionary based computer algorithms, genetic algorithms (GAs), on microcontrollers. …”
Conference paper -
2
Improving resource management with multi-instance broker scheduling algorithm in hierarchical grid computing
Published 2016“…This research addresses the performance issue of grid computing based on resource management, resource broker, resource scheduling and algorithm for middleware in the grid environment. …”
Get full text
Get full text
Get full text
Thesis -
3
Investigation of evolutionary multi-objective algorithms in solving view selection problem / Seyed Hamid Talebian
Published 2013“…As a comparative study, the performance of the algorithms was evaluated based on various standard metrics. …”
Get full text
Get full text
Thesis -
4
Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems
Published 2021“…Such approach is highly dependable on the clustering algorithm parameterization, and is not capable to deal with the normal system’s specification changes. …”
Get full text
Get full text
Thesis -
5
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…The focus of this analysis is on original observations that performed a detecting outlier and power transformation to transform not normally distributed data to near normality. The correlation of each system calls are examined using coefficient correlations of each selected system call variables. …”
Get full text
Get full text
Thesis -
6
JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation
Published 2008“…The proposed approach uses a frequency domain combinational framework of coefficients scrambling with Key Scheduling Algorithm based (KSA-based) permutation. This novel algorithm applies coefficients scrambling using Combined-Reverse-and-Normal-Direction (CRND) scanning together with Distorted DC permutation (DDP). …”
Get full text
Get full text
Thesis -
7
Parallel distributed computational microcontroller system for adaptive antenna downlink transmitter power optimization
Published 2023“…Parallel Distributed Genetic Algorithm (PDGA) is employed in adaptive beam forming technique to reduce power usage of adaptive antenna at WCDMA base station. …”
Article -
8
Optimum capacitor placement and sizing for distribution system based on an improved voltage stability index
Published 2012“…An algorithm is also proposed, based on RVSI, for optimum shunt capacitor placement in the distribution system. …”
Get full text
Get full text
Article -
9
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
Published 2012“…The distribution of data will be based on the chosen percentages,which is entered by a sender.These percentages will be agreed between both the sender and the receiver as a key of hiding.The proposed system goal is to provide more complexity in encryption and make the embedding capacity as high as possible with high visible quality in a way that it does not allow any attacker to even detect that there are secret messages.The complexity of encryption and concealment was checked out with a number of widely used metrics such as Peak Signal to Noise Ratio(PSNR),Mean Squared Error(MSE), Normalized Absolute Error (NAE) and Normalized Correlation Coefficient (NCC).The experimental results demonstrate the complexity of the proposed method compared with the standard and existing methods.…”
Get full text
Get full text
Undergraduates Project Papers -
10
Automatic database of robust neural network forecasting / Saadi Ahmad Kamaruddin, Nor Azura Md. Ghani and Norazan Mohamed Ramli
Published 2014“…The backpropagation algorithm is one of the most famous algorithms to train neural network based on the mean square error (MSE) of ordinary least squares (OLS). …”
Get full text
Get full text
Get full text
Book Section -
11
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
Published 2012“…The distribution of data will be based on the chosen percentages,which is entered by a sender.These percentages will be agreed between both the sender and the receiver as a key of hiding.The proposed system goal is to provide more complexity in encryption and make the embedding capacity as high as possible with high visible quality in a way that it does not allow any attacker to even detect that there are secret messages.The complexity of encryption and concealment was checked out with a number of widely used metrics such as Peak Signal to Noise Ratio(PSNR),Mean Squared Error(MSE), Normalized Absolute Error (NAE) and Normalized Correlation Coefficient (NCC).The experimental results demonstrate the complexity of the proposed method compared with the standard and existing methods.…”
Get full text
Get full text
Thesis -
12
Optimal network reconfiguration and intelligent service restoration prediction technique based on Cuckoo search spring algorithm / Mohamad Izwan Zainal
Published 2022“…This switch will change the condition after distribution network triggers any abnormal during operating system. …”
Get full text
Get full text
Thesis -
13
A study on advanced statistical analysis for network anomaly detection
Published 2005“…The focus of this analysis is on original observations that performed a detecting outlier and power transformation to transform not normally distributed data to near normality. The correlation of each system calls are examined using coefficient correlations of each selected system call variables. …”
Get full text
Monograph -
14
The effect of dose calculation algorithms on the normal tissue complication probability values of thoracic cancer
Published 2015“…Materials and Methods: NTCP values from BIOPLAN software is calculated based on standard DVH data. Dose distributions of treatment plans are calculated by using two different algorithms of Oncentra Masterplan (OMP) treatment planning system (TPS) which are Collapse Cone and Pencil Beam. …”
Get full text
Get full text
Monograph -
15
Multi-Objective Hybrid Algorithm For The Classification Of Imbalanced Datasets
Published 2019“…For this purpose, the normal distributions are applied to each class. The parameters of this distribution are optimized by applying the proposed MOHA. …”
Get full text
Get full text
Thesis -
16
Adaptive Neural Subtractive Clustering Fuzzy Inference System for the Detection of High Impedance Fault on Distribution Power System
Published 2012“…HIF and other operation event data were obtained by simulation of a 13.8 kV distribution feeder using PSCAD. The results show that the proposed algorithm can distinguish successfully HIFs from other events in distribution power system…”
Get full text
Get full text
Get full text
Article -
17
High Impedance Fault Detection on Power Distribution Feeder
Published 2012“…HIF and other operation event data were obtained by simulation of a 13.8 kV distribution feeder using PSCAD. The results show that the proposed algorithm can distinguish successfully HIFs from other events in distribution power system.…”
Get full text
Get full text
Get full text
Article -
18
Development of classification model between clean water and polluted water based on capacitance properties using Levenberg Marquardt (LM) algorithm of artificial neural network / M...
Published 2020“…For both cases, the statistical analysis data show that the p-value is more than 0.05, which indicates that the data are normally distributed. These measurement inputs were then going through the process of classification in ANN to generate the optimized models by using LM algorithm. …”
Get full text
Get full text
Student Project -
19
Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah
Published 2015“…Based on the identified statistical parameters, a new Time Based Policing and Shaping algorithm is developed and simulated. …”
Get full text
Get full text
Thesis -
20
A new efficient checkpointing algorithm for distributed mobile computing
Published 2015“…In fact, it is necessary now to think about other techniques or at least adapt those to devise effective and well suited techniques for the mobile environment. Considering this issue, the contribution in this paper is a proposal of a new checkpointing algorithm suitable for mobile computing systems. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article
