Search Results - (( probable distribution computer algorithm ) OR ( data distribution system algorithm ))

Refine Results
  1. 1

    An improvement on the valiantbrebner hypercube data broadcasting technique / Nasaruddin Zenon by Zenon, Nasaruddin

    Published 1990
    “…The intended meaning of broadcasting there is the mannereach datum is distributed among the processors in a computer system. …”
    Get full text
    Get full text
    Article
  2. 2

    Determination of dengue hemorrhagic fever disease factors using neural network and genetic algorithms / Yuliant Sibaroni, Sri Suryani Prasetiyowati and Iqbal Bahari Sudrajat by Yuliant, Sibaroni, Sri Suryani, Prasetiyowati, Iqbal Bahari, Sudrajat

    Published 2020
    “…This experiment show that the main factors that influence the spread of DHF in Bandung area are temperature, altitude, distribution of gender, and distribution of education levels. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Deadline-aware heuristics for reliability optimization in ubiquitous mobile edge computing by Zaman, S.K.U., Maqsood, T., Ramzan, A., Rehman, F., Mustafa, S., Shuja, J.

    Published 2023
    “…We consider the latency and offloading failure probability as performance evaluation parameters. The simulation results reveal that the proposed Deadline-aware Heuristic Algorithm (DHA) achieves a remarkable total latency of 12.67Â ms, coupled with a mere 0.095 probability of offloading failure. …”
    Get full text
    Get full text
    Article
  5. 5

    Transformer asset management based on Markov Prediction Model utilizing health index by Yahaya, Muhammad Sharil

    Published 2019
    “…The maintenance costs were estimated based on future-state distribution probabilities according to the developed MPM and the proposed maintenance policy model. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Application of Mellin-Kamal transformation in EL Gamal Ciphertext Cryptosystem / Nurul Syazwani Husairi and Nurul Aqilah Mohd Fauzi by Husairi, Nurul Syazwani, Mohd Fauzi, Nurul Aqilah

    Published 2023
    “…El Gamal ciphertext cryptosystem is one of the fluently used algorithms to satisfy the security message or data transmission. …”
    Get full text
    Get full text
    Student Project
  7. 7

    Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection by Nadheer Abdulridha, Shalash

    Published 2015
    “…In this study, in order to assess the system reliability, distribution protection system design and coordination, two models of MAS techniques to determine the suitability of the Distributed Generator (DG) location based on power system reliability and new index reliability of the relay operating time are proposed. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Service and Voltage Sag Study of Humid and Dry Weather Utilities by Khan, Nasrullah, Marion, Norman, Bashi, Sinan Mahmod, Yusuf, Sallehhudin

    Published 2002
    “…Power quality reliability indices were calculated to measure the operational system performance. The study has been focused to formulate algorithm for estimating probability of nuisance trip outs in industrial organizations operating in humid and hot dry environments. …”
    Get full text
    Get full text
    Article
  9. 9

    Enhanced replication strategy with balanced quorum technique and data center selection method in cloud environment by Mohd Ali, Fazlina

    Published 2022
    “…In order to store these huge volumes with heterogenous data categories, cloud computing became the mainstream solution to provide multiple services to keep safe, process and distribute the data. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Effective pilot assignment schemes in massive MIMO systems by Al-Hubaishi, Ahmed Saleh Noman

    Published 2022
    “…Not only is the uplink data rate greatly improved, but also the time computational complexity is further reduced. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14

    Fair bandwidth distribution marking and scheduling algorithm in network traffic classification by Al-Kharasani, Ameen Mohammed Abdulkarem

    Published 2019
    “…Finally, propose a new method of obtaining optimal parameters dropping functions for Random Early Detection (RED) algorithm. The analytical model was improved, computing the marking probability can be used in the planning of a network architecture. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Adaptive load balancing algorithm for wireless distributed computing networks by Alfaqawi, Mohammed, Habaebi, Mohamed Hadi, Siddiqi, Mohammad Umar, Islam, Md. Rafiqul, Khan, Sheroz, Datla, Dinesh

    Published 2016
    “…The concept of wireless distributed computing (WDC), proposed recently, is used to distribute and allocate computational tasks wirelessly. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  17. 17

    Estimation of transformers health index based on condition parameter factor and hidden Markov model by Mohd Selva, Amran, Yahaya, Muhammad Sharil, Azis, Norhafiz, Ab Kadir, Mohd Zainal Abidin, Jasni, Jasronita, Yang Ghazali, Young Zaidey

    Published 2018
    “…Subsequently, the future states probability distribution was computed based on the HMM prediction model and viterbi algorithm was applied to find the best optimal path sequence of HI for the respective observable condition. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Some families of count distributions for modelling zero-inflation and dispersion / Low Yeh Ching by Low, Yeh Ching

    Published 2016
    “…A Monte Carlo simulation technique is examined and employed to overcome the computational issues arising from the intractability of the probability mass function of some mixed Poisson distributions. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…To process large-scale data sequences, it is important to choose a suitable learning algorithm that is capable to learn in real time. …”
    Get full text
    Get full text
    Thesis