Search Results - data distribution ((some algorithm) OR (model algorithm))*

Refine Results
  1. 1

    Dynamic replication algorithm in data grid: Survey by K. Madi, Mohammed, Hassan, Suhaidi

    Published 2008
    “…In this paper, we present a survey of some related previous works and highlight some various algorithms that have been proposed by other researchers. …”
    Get full text
    Get full text
    Get full text
    Book Section
  2. 2
  3. 3

    A simulation study of a parametric mixture model of three different distributions to analyze heterogeneous survival data by Mohammed, Yusuf Abbakar, Yatim, Bidin, Ismail, Suzilah

    Published 2013
    “…In this paper a simulation study of a parametric mixture model of three different distributions is considered to model heterogeneous survival data.Some properties of the proposed parametric mixture of Exponential, Gamma and Weibull are investigated.The Expectation Maximization Algorithm (EM) is implemented to estimate the maximum likelihood estimators of three different postulated parametric mixture model parameters.The simulations are performed by simulating data sampled from a population of three component parametric mixture of three different distributions, and the simulations are repeated 10, 30, 50, 100 and 500 times to investigate the consistency and stability of the EM scheme.The EM Algorithm scheme developed is able to estimate the parameters of the mixture which are very close to the parameters of the postulated model.The repetitions of the simulation give parameters closer and closer to the postulated models, as the number of repetitions increases, with relatively small standard errors.…”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Some families of count distributions for modelling zero-inflation and dispersion / Low Yeh Ching by Low, Yeh Ching

    Published 2016
    “…A popular distribution for the modelling of discrete count data is the Poisson distribution. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari by Satari, Siti Zanariah

    Published 2015
    “…This study focuses on the parameter estimation and outlier detection for some types of the circular model. We first look at the concentration parameter of von Mises distribution. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Optimal network reconfiguration and intelligent service restoration prediction technique based on Cuckoo search spring algorithm / Mohamad Izwan Zainal by Zainal, Mohamad Izwan

    Published 2022
    “…In this research, Cuckoo Search Spring Algorithm (CSSA) is proposed to enhance the robustness of algorithm by constructing the optimal network reconfiguration consist of reducing power losses and improve voltage profile with the various loadability factor as the constraint according to load profile, based on single and multiobjective model. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Classification of imbalanced travel mode choice to work data using adjustable svm model by Qian, Y., Aghaabbasi, M., Ali, M., Alqurashi, M., Salah, B., Zainol, R., Moeinaddini, M., Hussein, E.E.

    Published 2021
    “…This study deals with imbalanced mode choice data by developing an algorithm (SVMAK) based on a support vector machine model and the theory of adjusting kernel scaling. …”
    Get full text
    Get full text
    Article
  9. 9

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Simulation of Empty Container Logistic Management at Depot by Sze, San Nah, Sek, Siaw Ying Doreen, Chiew, Kangleng, Tiong, W.K

    Published 2017
    “…Then, the feasible route with the minimum cost will be determined by applying the proposed heuristic algorithm. The heuristic algorithm can be divided into three main phases which are data sorting, data assigning and time window updating.…”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Load-Balancing Models for Scheduling Divisible Load on Large Scale Data Grids by Abduh Kaid, Monir Abdullah

    Published 2009
    “…In many data grid applications, data can be decomposed into multiple independent sub datasets and distributed for parallel execution. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Hybrid meta-heuristic algorithm for solving multi-objective aggregate production planning in fuzzy environment by Kalaf, Kalaf, Bayda Atiya

    Published 2017
    “…The proposed strategy is dependent on modified Zimmermanns approach for handling all inexact operating costs, data capacities, and demand variables. The SD algorithm is employed to balance exploitation and exploration in MSA, thereby resulting in efficient and effective (speed and quality) solution for the APP model. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Small Dataset Learning In Prediction Model Using Box-Whisker Data Transformation by Lateh, Masitah bdul

    Published 2020
    “…Next, samples are generated from Normal Distribution. To test the effectiveness of the proposed algorithm, the real and generated samples is added to training phase to build a prediction model using M5 Model Tree. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Development of bi-objective optimization model for supply chain network design using data envelopment analysis by Rahimi, Iman

    Published 2017
    “…Several examples have been applied to verify and validate the effectiveness of proposed model and Benders decomposition algorithm. An example from the real case was considered to verify and validate the proposed model. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Non-Parametric and Parametric Estimations of Cure Fraction Using Right-and Interval-Censored Data by Aljawdi, Bader

    Published 2011
    “…In this thesis, we considered two methods via the expectation maximization (EM) algorithm for cure rate estimation based on the BCH model using the two censoring types common to cancer clinical trials; namely, right and interval censoring. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Markov chain Monte Carlo convergence diagnostics for Gumbel model by Mohd Amin, Nor Azrita, Adam, Mohd. Bakri

    Published 2016
    “…The MCMC technique, Metropolis-Hastings algorithm is used for posterior inferences of Gumbel distribution simulated data.…”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Statistical modelling of time series of counts for a new class of mixture distributions / Khoo Wooi Chen by Khoo, Wooi Chen

    Published 2016
    “…For low count series the k-step ahead conditional distribution of the MPT model practically exhibits better performance than the other models. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A bayesian via laplace approximation on log-gamma model with censored data by Yusuf, Madaki Umar, Abu Bakar, Mohd Rizam, Husain, Qasim Nasir, Ibrahim, Noor Akma, Arasan, Jayanthi

    Published 2016
    “…Log-gamma distribution is the extension of gamma distribution which is more flexible, versatile and provides a great fit to some skewed and censored data. …”
    Get full text
    Get full text
    Article