Search Results - (( weibull distribution process algorithm ) OR ( parallel optimization path algorithm ))

Refine Results
  1. 1

    Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah by Abdullah, Mohd Azrul

    Published 2015
    “…Analysis results present Weibull Distribution model is the best fitted model. …”
    Get full text
    Get full text
    Article
  2. 2

    Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah by Abdullah, Mohd Azrul

    Published 2015
    “…Analysis results present Weibull Distribution model is the best fitted model. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Tool path generation of contour parallel based on ant colony optimisation by Abdullah, Haslina, Ramli, Rizauddin, Abd Wahab, Dzuraidah, Abu Qudeiri, Jaber

    Published 2016
    “…An Ant Colony Optimisation (ACO) method is used to optimize the tool path length because of its capability to find the shortest tool path length. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Peak time bandwidth control algorithms with fitted traffic model on broadband network YouTube video traffic: article / Aini Azmi by Azmi, Aini

    Published 2016
    “…Bandwidth Control Algorithms is developed based on Peak Time of day and night. …”
    Get full text
    Get full text
    Article
  6. 6

    Peak time bandwidth control algorithms with fitted traffic model on broadband network YouTube video traffic / Aini Azmi by Azmi, Aini

    Published 2016
    “…Bandwidth Control Algorithms is developed based on Peak Time of day and night. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Risk analysis of the copula dependent aggregate discounted claims with Weibull inter-arrival time by Siti Norafidah Mohd Ramli, Sharifah Farah Syed Yusoff Alhabshi, Nur Atikah Mohamed Rozali

    Published 2021
    “…We model the recursive moments of aggregate discounted claims, assuming the inter-claim arrival time follows a Weibull distribution to accommodate overdispersed and underdispersed data set. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Parametric and Semiparametric Competing Risks Models for Statistical Process Control with Reliability Analysis by Mohamed Elfaki, Faiz Ahmed

    Published 2004
    “…From the simulation study for this particular case, we can conclude that Weibull distribution describes well the nature of the model concerned as compared to the exponential distribution in terms of the mean value of parameter estimates, bias, and the root means square error. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Multiobjective optimization using particle swarm optimization with non-Gaussian random generators by Ganesan, T., Vasant, P., Elamvazuthi, I.

    Published 2016
    “…The two non-Gaussian distributions are the Weibull and Gamma distributions. …”
    Get full text
    Get full text
    Article
  12. 12

    Multiobjective optimization using particle swarm optimization with non-Gaussian random generators by Ganesan, T., Vasant, P., Elamvazuthi, I.

    Published 2016
    “…The two non-Gaussian distributions are the Weibull and Gamma distributions. …”
    Get full text
    Get full text
    Article
  13. 13

    Multiobjective optimization using particle swarm optimization with non-Gaussian random generators by Ganesan, T., Vasant, P., Elamvazuthi, I.

    Published 2016
    “…The two non-Gaussian distributions are the Weibull and Gamma distributions. …”
    Get full text
    Get full text
    Article
  14. 14

    Multiobjective optimization using particle swarm optimization with non-Gaussian random generators by Ganesan, T., Vasant, P., Elamvazuthi, I.

    Published 2016
    “…The two non-Gaussian distributions are the Weibull and Gamma distributions. …”
    Get full text
    Get full text
    Article
  15. 15

    Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution / Nor Azura Ayop by Ayop, Nor Azura

    Published 2016
    “…Log likelihood estimation technique is used to fit the best 2-parameter CDF compared to Weibull, Normal and Rician distribution model. The percentage level 5% under original bandwidth used is developed on policing and shaping algorithms to control bandwidth used. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Restoration planning strategy of transmission system based on optimal energizing time of sectionalizing islands / Dian Najihah Abu Talib by Dian Najihah , Abu Talib

    Published 2019
    “…There are two discrete optimization techniques used in this work, which are the Artificial Bee Colony algorithm and Evolutionary Programming. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Some families of count distributions for modelling zero-inflation and dispersion / Low Yeh Ching by Low, Yeh Ching

    Published 2016
    “…Two new mixed Poisson distributions, namely a three-parameter Poisson-exponentiated Weibull distribution and a fourparameter generalized Sichel distribution is introduced to model over dispersed, zeroinflated and long-tailed count data. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A novel large-bit-size architecture and microarchitecture for the implementation of Superscalar Pipeline VLIW microprocessors by Lee, Weng Fook

    Published 2008
    “…Different adder architectures are investigated for suitability on synthesis implementation of large data bus size adder for efficient usage within the ALU. An adder algorithm using repetitive constructs in a parallel algorithm that allows for efficient and optimal synthesis for large data bus size is proposed as a suitable implementation for the adder within the ALU. …”
    Get full text
    Thesis
  19. 19

    A 'snowflake' geometrical representation for optimised degree six 3-modified chordal ring networks by Chien, Stephen Lim Een, Raja Maamor Shah, Raja Noor Farah Azura, Othman, Mohamed

    Published 2016
    “…A tree visualisation was constructed based on its connectivity to enable the generation of formulae for optimal diameter and average optimal path lengths. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques by Mustafa, Ahmed Sudad

    Published 2017
    “…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
    Get full text
    Get full text
    Get full text
    Thesis