Search Results - normal distribution control algorithm
Search alternatives:
- distribution control »
-
1
Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution / Nor Azura Ayop
Published 2016“…Log likelihood estimation technique is used to fit the best 2-parameter CDF compared to Weibull, Normal and Rician distribution model. The percentage level 5% under original bandwidth used is developed on policing and shaping algorithms to control bandwidth used. …”
Get full text
Get full text
Thesis -
2
Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution: article / Nor Azura Ayop
Published 2016“…Log likelihood estimation technique is used to fitted the best 2-parameter CDF compared to WeibuII, Normal and Rician distribution model. The percentage level 5% under original bandwidth used is developed on policing and shaping algorithms to control bandwidth used. …”
Get full text
Get full text
Article -
3
Peak time bandwidth control algorithms with fitted traffic model on broadband network YouTube video traffic: article / Aini Azmi
Published 2016“…Bandwidth Control Algorithms is developed based on Peak Time of day and night. …”
Get full text
Get full text
Article -
4
Peak time bandwidth control algorithms with fitted traffic model on broadband network YouTube video traffic / Aini Azmi
Published 2016“…Bandwidth Control Algorithms is developed based on Peak Time of day and night. …”
Get full text
Get full text
Thesis -
5
Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah
Published 2015“…Anderson-Darling (AD) and Goodness of Fit test is used to identify the best fitted distribution model to the real data. Four traffic distribution which are normal, lognormal, Weibull and exponential distribution are fitted and derived. …”
Get full text
Get full text
Thesis -
6
Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah
Published 2015“…Anderson-Darling (AD) and Goodness of Fit test is used to identify the best fitted distribution model to the real data. Four traffic distribution which are normal, lognormal, Weibull and exponential distribution are fitted and derived. …”
Get full text
Get full text
Article -
7
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…This algorithm was minimal in line code to make it lightweight and made use of the controller's functionality without adding extra computational burden on the controller.…”
Get full text
Get full text
Thesis -
8
-
9
-
10
Tactile slippage analysis in optical three-axis tactile sensor for robotic hand
Published 2014“…Detailed explanations of the control algorithm based on the existing robot arm control system are presented. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
PSO modelling and PID controlled of automatic fish feeder system
Published 2020“…The main objective of this study is to improve the performance of fish feeding system by using PID controller through ARX modelling. In this study, raw data at distribution part with speed of 130 rpm, 160 rpm, 190 rpm, 220 rpm and 250 rpm were extracted and used to determine ARX equation parameters as transfer function by using PSO algorithm to optimize ARX model parameter. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
-
13
Streamflow prediction with large climate indices using several hybrid multilayer perceptrons and copula Bayesian model averaging
Published 2023“…Climate models; Flood control; Floods; Forecasting; Information management; Inverse problems; Mean square error; Multilayer neural networks; Multilayers; Normal distribution; Particle swarm optimization (PSO); Reservoir management; Reservoirs (water); Risk management; Rivers; Stream flow; Uncertainty analysis; Bat algorithms; Bayesian model averaging; Bayesian modelling; Copula bayesian model; Gamma test; Inclusive multiple model; Multilayers perceptrons; Multiple-modeling; Natural hazard; Optimization algorithms; Bayesian networks; flood; flood control; North Atlantic Oscillation; perception; reservoir; streamflow; uncertainty analysis; Kelantan; Malaysia; West Malaysia…”
Article -
14
An enhanced cluster head selection algorithm for routing in mobile AD-HOC network
Published 2017“…The end to end delay, the number of dropped packets, and normalized control overhead was reduced.The results presented in this thesis are significant in terms of making clustering algorithms acceptable to users and improving the performance of cluster formations, maintenance and routing algorithms over MANET. …”
Get full text
Get full text
Thesis -
15
Statistical monitoring of supplier performance in a quality management system environment for the Iranian automotive industry
Published 2010“…Furthermore, the exploratory product audit method (PQAS) was developed based on normal distribution so as to quantify supplier’s quality. …”
Get full text
Get full text
Thesis -
16
Optimisation of distributed generation in electric power systems using fuzzy-genetic algorithm approach
Published 2011“…This model takes into account, the peculiarities of radial distribution networks, such as high R/X (resistance/reactance) ratio, voltage dependency and composite nature of loads.To solve the proposed models, Genetic algorithm (GA) is used as an optimisation technique. …”
Get full text
Get full text
Thesis -
17
Integration of fuzzy logic control algorithm in the development of optical fiber daylighting system for energy savings / Fuziah Sulaiman.
Published 2006“…The switch used Fuzzy Logic Control Algorithm for automated lighting and dimming control. …”
Get full text
Get full text
Thesis -
18
Fault detection and diagnosis using correlation coefficients
Published 2005“…Data collected with a process sampling time, TMSPC, of 4.6 hours and following the normal distribution are used as Nominal Operation Condition (NOC) data. …”
Get full text
Get full text
Thesis -
19
Soap performance enhancement for high volume messaging / Ali Baba Dauda
Published 2018“…Two messages formats, normal and compressed (modified algorithm) with the size ranging 1MB - 22 MB were generated and executed 50 times in both web services. …”
Get full text
Get full text
Get full text
Thesis -
20
Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems
Published 2021“…Such approach is highly dependable on the clustering algorithm parameterization, and is not capable to deal with the normal system’s specification changes. …”
Get full text
Get full text
Thesis
