Search Results - property distribution ((((function algorithm) OR (_ algorithm))) OR (based algorithm))
Search alternatives:
- property distribution »
- function algorithm »
-
1
Semiparametric inference procedure for the accelarated failure time model with interval-censored data
Published 2019“…The rank-based methods, estimating algorithms, and resampling techniques that are developed do not involve the difficulties of the existing estimating procedures. …”
Get full text
Get full text
Get full text
Thesis -
2
Efficient genetic partitioning-around-medoid algorithm for clustering
Published 2019“…However, the complexity of the kmedoid based algorithms in general is more than the complexity of the k-means based algorithms. …”
Get full text
Get full text
Thesis -
3
High performance visualization of human tumor growth software
Published 2008“…The platform for high performance computing of the parallel algorithms run on a distributed parallel computer system. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
A new Gompertz-three-parameter-lindley distribution for modeling survival time data
Published 2025“…The statistical properties of the proposed distribution including the shape properties, cumulative distribution, quantile functions, moment generating function, failure rate function, mean residual function, and stochastic orders are studied. …”
Get full text
Get full text
Get full text
Article -
5
Enhanced Automated Framework For Cattle Tracking And Classification
Published 2022“…An enhanced object tracking algorithm (PFtmM) that integrates enhanced particle filter algorithm (PFtm) with mean-shift tracker (M) is proposed and deployed as first step to address the problems arise due to occurrence of occlusion and non-linear movement of cow objects in video. …”
Get full text
Get full text
Thesis -
6
Enhanced marking process (EMP) for constructing dominating set in mobile ad-hoc networks with unidirectional links
Published 2014“…Our enhanced algorithm features a good locality properties since it need only 2-hop neighborhood information within each node. …”
Get full text
Get full text
Get full text
Article -
7
A Novel Approach Of Groebner Bases Computation For Safety Analysis Of Distributed Discrete Controllers
Published 2019“…One of the favorite topic is the formal verification via model checking, which is to verify whether a mathematical model of a system meets the formal specification that describes the property to be checked. In this research, our main objective is to generate a new model checking computation method based on Groebner bases algorithm for safety property analysis of distributed discrete controllers. …”
Get full text
Get full text
Get full text
Technical Report -
8
On a new transmuted three-parameter lindley distribution and its applications
Published 2024“…The statistical properties of the TTHPLD model, which are based on moments, order statistics, hazard rate functions, reliability functions, and Renyi entropy, have been studied. …”
Get full text
Get full text
Get full text
Article -
9
A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem
Published 2016“…In addition, the classifier is also optimized such that it has a good generalization property. The main keys of the new classifier are based on the new kernel method, new learning metric and a new optimization algorithm in order to optimize the SVM decision function. …”
Get full text
Get full text
Get full text
Thesis -
10
High performance simulation for brain tumors growth using parabolic equation on heterogeneous parallel computer systems
Published 2007“…The implementation of parallel algorithm based on parallel computing system is used to capture the growth of brain tumour. …”
Get full text
Get full text
Article -
11
-
12
High performance simulation for brain tumours growth using parabolic equation on heterogeneous parallel computer system
Published 2007“…The implementation of parallel algorithm based on parallel computing system is used to capture the growth of brain tumour. …”
Get full text
Get full text
Get full text
Article -
13
The implementation of forward chaining algorithm in calculating inheritance property based on faraid law / Nur Ain Syafiqah Mohammad Marzuki
Published 2021“…Therefore, the purpose of this study is to facilitate the use of Forward Chaining Algorithm to calculate Faraid based on inheritance division. …”
Get full text
Get full text
Student Project -
14
Geometric feature descriptor and dissimilarity-based registration of remotely sensed imagery
Published 2024journal::journal article -
15
A New Cryptosystem Based on Decimal Numbers and Nonlinear Function
Published 2009Get full text
Get full text
Thesis -
16
A novel scheduling algorithm based on game theory and multicriteria decision making in LTE network
Published 2015“…However, 3GPP is not a standardized scheduling algorithm to utilize LTE properties in smart grid applications. …”
Get full text
Get full text
Get full text
Article -
17
Parameter-driven count time series models / Nawwal Ahmad Bukhari
Published 2018“…The first part of the study derives the explicit solutions of the moment properties (mean, variance, skewness and kurtosis) of the distributions together with their respective autocovariance and autocorrelation functions, up to the ith order. …”
Get full text
Get full text
Get full text
Thesis -
18
Predicting the popularity of tweets using the theory of point processes.
Published 2019“…We first propose a marked point process model, termed the Marked Self-Exciting Process with Time-Dependent Excitation Function, or the MaSEPTiDE for short. The intensity process of the model is interpretable as a cluster Poisson process, which implies that the model can be simulated using the cascading algorithm similar to that used for the efficient simulation of Hawkes processes, and the prediction can be done properly by exploiting the probabilistic properties of the model. …”
Get full text
Get full text
UMK Etheses -
19
The Rise of Blockchain Internet of Things (BIoT): Secured, Device-to-Device Architecture and Simulation Scenarios
Published 2022“…To encrypt the elliptical curve cryptographic (ECC) and to generate keys, the Chinese remainder theorem (CRT)-based scheme is proposed and compared with the secure hash algorithm (SHA-256). …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
20
Inelastic analysis of composite sections
Published 2004“…The algorithm is based on finding the strain distribution across the section for a given applied loads and mechanical properties of the materials. …”
Get full text
Get full text
Get full text
Article
