Search Results - normal distribution ((some algorithm) OR (((force algorithm) OR (tree algorithm))))
Search alternatives:
- force algorithm »
- some algorithm »
- tree algorithm »
-
1
Optimal network reconfiguration and intelligent service restoration prediction technique based on Cuckoo search spring algorithm / Mohamad Izwan Zainal
Published 2022“…Later, this MOCSSA is applied on service restoration to ensure the proposed algorithm technique is suitable in selecting the optimal switches for supply recovery after the line section is isolated from the system either by forced outage or planned outage purposes. …”
Get full text
Get full text
Thesis -
2
Small Dataset Learning In Prediction Model Using Box-Whisker Data Transformation
Published 2020“…Subsequently, the Small Johnson Data Transformation is employed to transformed raw samples to a Normal Distribution. Next, samples are generated from Normal Distribution. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
White root disease auto-detection system for rubber trees based on dynamic electro-biochemical latex properties / Mohd Suhaimi Sulaiman
Published 2019“…Based on the statistical results, all of the measured data were normally distributed and can be discriminated since the significant value for normality test for all measured data were greater than 0.05 and paired sample t-test showed significant value less than 0.05. …”
Get full text
Get full text
Thesis -
4
JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation
Published 2008“…This thesis work studied on digital image encryption algorithms performed towards JPEG images. With image encryption algorithms, JPEG images can be securely scrambled or encrypted prior to distribution. …”
Get full text
Get full text
Thesis -
5
Tactile slippage analysis in optical three-axis tactile sensor for robotic hand
Published 2014“…The optical three-axis tactile sensor is a type of tactile sensor capable of defining normal and shear forces simultaneously. Shear force distribution is used to define slippage sensation in the robot hand system. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
An Integrated Principal Component Analysis And Weighted Apriori-T Algorithm For Imbalanced Data Root Cause Analysis
Published 2016“…In conclusion, the proposed algorithm is able to overcome the rare item issue by implementing covariance based support value normalization and high computational costs issue by implementing indexing enumeration tree structure.Future work of this study should focus on rule interpretation to generate more human understandable rule by novice in data mining. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Dynamic robust bootstrap method based on LTS estimators
Published 2009“…The applications of bootstrap methods in regression analysis have drawn much attention to the statistics practitioners because of some practical reasons. In order to make reliable inferences about the parameters of a model, require that the parameter estimates are normally distributed. …”
Get full text
Get full text
Article -
8
Enhancing clustering algorithm with initial centroids in tool wear region recognition
Published 2020“…It is embedded with a new tactic to recapture the K value and new initial seedings computation to kick off the system until it converges. Force components of cutting force Fc, thrust force Ft and perpendicular cutting force Fcn were extracted from Neo-MoMac cutting force measurement device. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Automated Face Detection Using Skin Color Segmentation and Viola-Jones Algorithm
Published 2019“…Despite of this, this research also found that both YCbCr and HSV color model are having some limitation when dealing with darker face and lightning condition since the skin color become slightly out of range from normal skin color distribution.…”
Get full text
Get full text
Get full text
Get full text
Article -
10
Investigation of evolutionary multi-objective algorithms in solving view selection problem / Seyed Hamid Talebian
Published 2013“…In addition to the normal metrics, the computational time for executing each algorithm was also measured and compared. …”
Get full text
Get full text
Thesis -
11
A Study of Ikaz and Normalized Hilbert transform for solving faulty in pipeline distribution system using transmission line modelling
Published 2019Get full text
Get full text
Get full text
Conference or Workshop Item -
12
A new variant of black hole algorithm based on multi population and levy flight for clustering problem
Published 2020“…The obtained results were compared with the BH and previous optimization algorithms for both test functions as well as data clustering in terms of normal and high dimensional datasets. …”
Get full text
Get full text
Thesis -
13
Constrained Self-Adaptive Harmony Search Algorithm With 2-Opt Swapping For Driver Scheduling Problem Of University Shuttle Bus
Published 2019“…In each iteration, the BW values were often changed and randomly chosen within the set, whereas the 2-opt swapping normally used in travelling salesman problem was applied for route constraint based on some rules. …”
Get full text
Get full text
Get full text
Article -
14
-
15
Adaptive Traffic Prioritization Algorithm Over Ad Hoc Network Using IEEE 802.11e
Published 2016“…Although IEEE 802.11e has been widely implemented in commercial hardware, the EDCA parameters are normally preset with some default values recommended by the standard. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Just Queuing: Policy-Based Scheduling Mechanism for Packet Switching Networks
Published 2011“…This research adopts the restricted charge policy which imposes the protection of normal user. In terms of the complexity property, genetic algorithm has an advantage in holding the fitness score of the queue in separate storage space which potentially minimises the complexity of the algorithm. …”
Get full text
Get full text
Get full text
Thesis -
17
Permission-based fault tolerant mutual exclusion algorithm for mobile Ad Hoc networks
Published 2015“…Due to these limitations, conventional mutual exclusion algorithms presented for distributed systems (DS) are not applicable for MANETs unless they attach to a mechanism for dynamic changes in their topology. …”
Get full text
Get full text
Thesis -
18
Inter-cell and intra-cell facility layout models under different demand environments in cellular manufacturing systems
Published 2012“…One of the models considers a Normal distribution function for demand, and another one, a Uniform distribution function. …”
Get full text
Get full text
Thesis -
19
Machine condition monitoring and fault diagnosis using spectral analysis techniques
Published 2001“…Vibration data are collected from the piezoelectric accelerometers placed at locations that provide rigid vibration transmission to them. Both normal and fault signals are analyzed using the singular value decomposition (SVD) algorithm so as to compute the parameters of the auto regressive moving average (ARMA) models. …”
Get full text
Get full text
Proceeding Paper -
20
Efficient task scheduling strategies using symbiotic organisms search algorithm for cloud computing environment
Published 2022“…To assess the effectiveness of the proposed approaches (eDSOS, CDSOS, and ADSOS) CloudSim simulator was used, using synthesised workloads (normal, left-half, right-half and uniform distributions). …”
Get full text
Get full text
Thesis
