Search Results - normal distribution ((process algorithm) OR (drops algorithm))
Search alternatives:
- process algorithm »
-
1
Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah
Published 2015“…Based on the identified statistical parameters, a new Time Based Policing and Shaping algorithm is developed and simulated. Policing process drops traffic while shaping process delay traffic to the next time transmissions. …”
Get full text
Get full text
Article -
2
Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah
Published 2015“…Based on the identified statistical parameters, a new Time Based Policing and Shaping algorithm is developed and simulated. Policing process drops traffic while shaping process delay traffic to the next time transmissions. …”
Get full text
Get full text
Thesis -
3
An enhanced cluster head selection algorithm for routing in mobile AD-HOC network
Published 2017“…The end to end delay, the number of dropped packets, and normalized control overhead was reduced.The results presented in this thesis are significant in terms of making clustering algorithms acceptable to users and improving the performance of cluster formations, maintenance and routing algorithms over MANET. …”
Get full text
Get full text
Thesis -
4
Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution / Nor Azura Ayop
Published 2016“…Log likelihood estimation technique is used to fit the best 2-parameter CDF compared to Weibull, Normal and Rician distribution model. The percentage level 5% under original bandwidth used is developed on policing and shaping algorithms to control bandwidth used. …”
Get full text
Get full text
Thesis -
5
Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution: article / Nor Azura Ayop
Published 2016“…Log likelihood estimation technique is used to fitted the best 2-parameter CDF compared to WeibuII, Normal and Rician distribution model. The percentage level 5% under original bandwidth used is developed on policing and shaping algorithms to control bandwidth used. …”
Get full text
Get full text
Article -
6
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
7
Development of classification model between clean water and polluted water based on capacitance properties using Levenberg Marquardt (LM) algorithm of artificial neural network / M...
Published 2020“…For both cases, the statistical analysis data show that the p-value is more than 0.05, which indicates that the data are normally distributed. These measurement inputs were then going through the process of classification in ANN to generate the optimized models by using LM algorithm. …”
Get full text
Get full text
Student Project -
8
The comparison of tardiness in scheduling techniques for task distribution using grid simulation tool
Published 2008“…The goal of this project is to test on tardiness parameter in local search based algorithms. A good scheduling algorithm normally shows lower value of total tardiness and schedule time. …”
Get full text
Get full text
Get full text
Thesis -
9
Optimisation of distributed generation in electric power systems using fuzzy-genetic algorithm approach
Published 2011“…This model takes into account, the peculiarities of radial distribution networks, such as high R/X (resistance/reactance) ratio, voltage dependency and composite nature of loads.To solve the proposed models, Genetic algorithm (GA) is used as an optimisation technique. …”
Get full text
Get full text
Thesis -
10
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Monograph -
11
Improving resource management with multi-instance broker scheduling algorithm in hierarchical grid computing
Published 2016“…Overall, the final results showed that the new designed algorithm (i.e., MiBSA algorithm) has successfully improved grid processing performance and successfully surpassed the performance of previous algorithm.…”
Get full text
Get full text
Get full text
Thesis -
12
Investigation of evolutionary multi-objective algorithms in solving view selection problem / Seyed Hamid Talebian
Published 2013“…In addition to the normal metrics, the computational time for executing each algorithm was also measured and compared. …”
Get full text
Get full text
Thesis -
13
A new efficient checkpointing algorithm for distributed mobile computing
Published 2015“…Considering this issue, the contribution in this paper is a proposal of a new checkpointing algorithm suitable for mobile computing systems. This algorithm is characterized by its efficiency and optimization in terms of incurred time-space overhead during checkpointing process and normal application running period.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
14
Peak pressure analysis of foot plantar distribution based on image processing algorithm
Published 2018“…The other main goal of this work is to create an algorithm which has the ability to formulate accurately and reliably the distribution of pressure over the foot plantar. …”
Get full text
Get full text
Get full text
Thesis -
15
Cost-effective scheduling analysis through discrete event simulation for distributed systems
Published 2015“…This condition makes the resources in distributed system overwhelmed by heterogeneity of task to be processed; that leads to fluctuation in resource availability. …”
Get full text
Get full text
Get full text
Book Section -
16
Peak time bandwidth control algorithms with fitted traffic model on broadband network YouTube video traffic: article / Aini Azmi
Published 2016“…Bandwidth Control Algorithms is developed based on Peak Time of day and night. …”
Get full text
Get full text
Article -
17
Peak time bandwidth control algorithms with fitted traffic model on broadband network YouTube video traffic / Aini Azmi
Published 2016“…Bandwidth Control Algorithms is developed based on Peak Time of day and night. …”
Get full text
Get full text
Thesis -
18
Optimal placement and sizing of distributed generation in radial distribution networks using particle swarm optimization and forward backward sweep method
Published 2012“…To address these issues, this thesis focuses mainly on the optimal placement and sizing of DG in the distribution networks. Electrical distribution network systems normally include distribution feeders,which are arranged or configured either in mesh or radial pattern and they are mainly fed by a utility substation. …”
Get full text
Get full text
Thesis -
19
Soap performance enhancement for high volume messaging / Ali Baba Dauda
Published 2018“…Two messages formats, normal and compressed (modified algorithm) with the size ranging 1MB - 22 MB were generated and executed 50 times in both web services. …”
Get full text
Get full text
Get full text
Thesis -
20
Tasks Distribution In Driver Scheduling Using Dynamic Set Of Bandwidth In Harmony Search Algorithm With 2-Opt
Published 2021“…Scheduling is important when dealing with task distributions and time management. In most organisations, the scheduling process is still generated manually. …”
Get full text
Get full text
Get full text
Thesis
