Search Results - normal distribution issues algorithm
Search alternatives:
-
1
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023“…This work is focused on the implementation of evolutionary based computer algorithms, genetic algorithms (GAs), on microcontrollers. …”
Conference paper -
2
Improving resource management with multi-instance broker scheduling algorithm in hierarchical grid computing
Published 2016“…The iHLBA scheduling algorithm was tested and it was found that the main issue was the delay occurring on the job submission. …”
Get full text
Get full text
Get full text
Thesis -
3
Multi-Objective Hybrid Algorithm For The Classification Of Imbalanced Datasets
Published 2019“…For this purpose, the normal distributions are applied to each class. The parameters of this distribution are optimized by applying the proposed MOHA. …”
Get full text
Get full text
Thesis -
4
A new efficient checkpointing algorithm for distributed mobile computing
Published 2015“…This algorithm is characterized by its efficiency and optimization in terms of incurred time-space overhead during checkpointing process and normal application running period.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
5
Tasks Distribution In Driver Scheduling Using Dynamic Set Of Bandwidth In Harmony Search Algorithm With 2-Opt
Published 2021“…Therefore, a tasks distribution in driver scheduling using dynamic set of bandwidth in harmony search algorithm with 2-opt (SBHS2-opt) was proposed in this research. …”
Get full text
Get full text
Get full text
Thesis -
6
Entropy in portfolio optimization / Yasaman Izadparast Shirazi
Published 2017“…The purpose of this new model is to overcome the limitations as observed in a traditional model; that is, having performance close to Markowitz’s mean-variance (MV) model when data comes from a normal distribution, but exhibit better performance when data comes from a non-normal distribution. …”
Get full text
Get full text
Get full text
Thesis -
7
Modeling The Modified Internal Rate Of Return (Mirr) For Long-Term Investment Strategy By The Assumption Of Gamma Distribution
Published 2023“…It offers greater flexibility compared to the commonly used normal distribution.…”
Get full text
Get full text
Thesis -
8
Investigation of evolutionary multi-objective algorithms in solving view selection problem / Seyed Hamid Talebian
Published 2013“…In addition to the normal metrics, the computational time for executing each algorithm was also measured and compared. …”
Get full text
Get full text
Thesis -
9
Optimal placement and sizing of distributed generation in radial distribution networks using particle swarm optimization and forward backward sweep method
Published 2012“…Electrical distribution network systems normally include distribution feeders,which are arranged or configured either in mesh or radial pattern and they are mainly fed by a utility substation. …”
Get full text
Get full text
Thesis -
10
Protection Coordination Toward Optimal Network Reconfiguration and DG Sizing
Published 2019“…The validity of the proposed method is analyzed on three commonly used IEEE 33-bus, 69-bus and 118-bus distribution systems, employing the firefly algorithm (FA) and evolutionary programming (EP) algorithm. …”
Get full text
Get full text
Article -
11
An Integrated Principal Component Analysis And Weighted Apriori-T Algorithm For Imbalanced Data Root Cause Analysis
Published 2016“…In conclusion, the proposed algorithm is able to overcome the rare item issue by implementing covariance based support value normalization and high computational costs issue by implementing indexing enumeration tree structure.Future work of this study should focus on rule interpretation to generate more human understandable rule by novice in data mining. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Efficient task scheduling strategies using symbiotic organisms search algorithm for cloud computing environment
Published 2022“…To assess the effectiveness of the proposed approaches (eDSOS, CDSOS, and ADSOS) CloudSim simulator was used, using synthesised workloads (normal, left-half, right-half and uniform distributions). …”
Get full text
Get full text
Thesis -
13
Constrained Self-Adaptive Harmony Search Algorithm With 2-Opt Swapping For Driver Scheduling Problem Of University Shuttle Bus
Published 2019“…In DSPUSB, fairness of task distribution among drivers is one of the main issues that are very crucial and can affect the performance and quality of services. …”
Get full text
Get full text
Get full text
Article -
14
-
15
-
16
Detection of arcing fault in underground distribution cable using artificial neural network
Published 2004“…The general aim of this study is to develop an arcing fault detection algorithm which can detect the presence of arcing fault in underground distribution cable. …”
Get full text
Get full text
Get full text
Thesis -
17
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
Published 2012“…The distribution of data will be based on the chosen percentages,which is entered by a sender.These percentages will be agreed between both the sender and the receiver as a key of hiding.The proposed system goal is to provide more complexity in encryption and make the embedding capacity as high as possible with high visible quality in a way that it does not allow any attacker to even detect that there are secret messages.The complexity of encryption and concealment was checked out with a number of widely used metrics such as Peak Signal to Noise Ratio(PSNR),Mean Squared Error(MSE), Normalized Absolute Error (NAE) and Normalized Correlation Coefficient (NCC).The experimental results demonstrate the complexity of the proposed method compared with the standard and existing methods.…”
Get full text
Get full text
Thesis -
18
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
Published 2012“…The distribution of data will be based on the chosen percentages,which is entered by a sender.These percentages will be agreed between both the sender and the receiver as a key of hiding.The proposed system goal is to provide more complexity in encryption and make the embedding capacity as high as possible with high visible quality in a way that it does not allow any attacker to even detect that there are secret messages.The complexity of encryption and concealment was checked out with a number of widely used metrics such as Peak Signal to Noise Ratio(PSNR),Mean Squared Error(MSE), Normalized Absolute Error (NAE) and Normalized Correlation Coefficient (NCC).The experimental results demonstrate the complexity of the proposed method compared with the standard and existing methods.…”
Get full text
Get full text
Undergraduates Project Papers -
19
Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems
Published 2021“…Such approach is highly dependable on the clustering algorithm parameterization, and is not capable to deal with the normal system’s specification changes. …”
Get full text
Get full text
Thesis -
20
Acltshe-Amts: A New Adaptive Brain Tumour Enhancement And Segmentation Approaches
Published 2024“…In this thesis, a two-stage approach is proposed to address these issues. In the first stage, a new image enhancement approach called Adaptive Clip Limit Tile Size Histogram Equalization (ACLTSHE) is proposed to improve contrast, highlight the hidden details, and achieve homogenized intensity distribution of MR images. …”
Get full text
Get full text
Thesis
