Search Results - (( parallel distribution factor algorithm ) OR ( data distribution rate algorithm ))

Refine Results
  1. 1

    Parallel power load abnormalities detection using fast density peak clustering with a hybrid canopy-K-means algorithm by Al-Jumaili A.H.A., Muniyandi R.C., Hasan M.K., Singh M.J., Paw J.K.S., Al-Jumaily A.

    Published 2025
    “…Data vectors are generated based on the time needed, sequential and parallel candidate feature data are obtained, and the data rate is combined. …”
    Article
  2. 2

    Design and analysis of management platform based on financial big data by Chen, Yuhua, Mustafa, Hasri, Zhang, Xuandong, Liu, Jing

    Published 2023
    “…In addition, a financial data management platform based on distributed Hadoop architecture is designed, which combines MapReduce framework with the fuzzy clustering algorithm and the local outlier factor (LOF) algorithm, and uses MapReduce to operate in parallel with the two algorithms, thus improving the performance of the algorithm and the accuracy of the algorithm, and helping to improve the operational efficiency of enterprise financial data processing. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Investigation on the dynamic of computation of semi autonomous evolutionary computation for syntactic optimization of a set of programming codes by Mohammad Sigit Arifianto, Tze, Kenneth Kin Teo, Liau, Chung Fan, Liawas Barukang, Zaturrawiah Ali Omar

    Published 2007
    “…Genetic Algorithm as one of the Evolutionary Computation method improve the execution of parallel programming codes by optimizing the number of processors and the distribution of data. …”
    Get full text
    Get full text
    Research Report
  4. 4

    Improved black-winged kite algorithm and finite element analysis for robot parallel gripper design by Haohao, Ma, As’arry, Azizan, Yanwei, Feng, Lulu, Cheng, Delgoshaei, Aidin, Ismail, Mohd Idris Shah, Ramli, Hafiz Rashidi

    Published 2024
    “…The Good Point Set (GPS), nonlinear convergence factor, and adaptive t-distribution method improve BKA, which enhances exploration and exploitation performance, convergence speed, and solution quality. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Dynamic replication aware load blanced scheduling in distributed environment / Said Bakhshad by Said Bakhshad, Bakhshad

    Published 2018
    “…It assigns the request of the node and then the node’s Replication Manager searches the presence of the replica. Several algorithms have been proposed and studied for scheduling and data replication, however a little research has been done so far on capturing and minimizing the migration rate of data from an existing available replica site to a next site on the basis of data scheduling in order to minimize the transfers and deletion rate. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Data discovery algorithm for scientific data grid environment by Abdullah, Azizol, Othman, Mohamed, Sulaiman, Md. Nasir, Ibrahim, Hamidah, Othman, Abu Talib

    Published 2005
    “…By using this model, we study various discovery algorithms for locating data sets in a data grid system. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Traffic management algorithms for LEO satellite networks by Huyop @ Ayop, Fahrul Hakim

    Published 2016
    “…The important parameters measured in the simulation are delay rate, throughput rate and fair traffic distribution rate. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Reliability Analysis and Prediction of Time to Failure Distribution of an Automobile Crankshaft by Salvinder Singh, Karam Singh, Shahrum, Abdullah, Nik Abdullah, Nik Mohamed

    Published 2015
    “…The developed stochastic algorithm has the capability to measure the parametric distribution function and validate the predict the reliability rate, mean time to failure and hazard rate. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Static and self-scalable filter range selection algorithms for peer-to-peer networks by Kweh, Yeah Lun

    Published 2011
    “…These algorithms are based on the statistical knowledge about the uniform distribution nature of the data and arranged in certain order in the file. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Estimation Of Weibull Parameters Using Simulated Annealing As Applied In Financial Data by Hamza, Abubakar

    Published 2023
    “…The present study proposes a simulated annealing algorithm (SA) in estimating the parameters of Weibull distribution with application to modified internal rate of return data (MIRR).The objective is to examine the investment potential of the shari’ah compliance companies of the Malaysia property sector (MPS). …”
    Get full text
    Get full text
    Thesis
  11. 11

    Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution / Nor Azura Ayop by Ayop, Nor Azura

    Published 2016
    “…By using MATLAB software, the Open Distribution Fitting application is fitted to the collected data to identifying the best distribution and the results presents GPD shows the highest value for best fitted traffic model. …”
    Get full text
    Get full text
    Thesis
  12. 12

    An Improved Distributed Scheduling Algorithm for Wireless Sensor Networks by Sheikh, Muhammad Aman, Drieberg , Micheal, Zain Ali, Noohul Basheer

    Published 2012
    “…Simulation results show that the IDSA significantly outperforms a representative distributed random slot assignment algorithm (DRAND).…”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
    Get full text
    Get full text
    Thesis
  14. 14

    A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem by Mohd Pozi, Muhammad Syafiq

    Published 2016
    “…Algorithmic level based methods however are based on introducing new optimization task to improve the minority class classification rate, without changing the data characteristics. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Identification of non-equilibrium growth for bitcoin exchange rate: mathematical derivation method in Islamic financial engineering by Rosbi, Sofian, Abu Bakar, Nashirah

    Published 2017
    “…Graphical method indicates the first difference of data distribution is a non-normal distribution. Then, Shapiro-Wilk statistical test confirmed that first difference of data distribution deviate from normal distribution. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    A novel scheduling algorithm based on game theory and multicriteria decision making in LTE network by Hindia, M.N., Reza, A.W., Noordin, K.A.

    Published 2015
    “…On the first level, bankruptcy and shapely value algorithm fairly distribute the resources among smart grid applications. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Non-Parametric and Parametric Estimations of Cure Fraction Using Right-and Interval-Censored Data by Aljawdi, Bader

    Published 2011
    “…In this case, the estimation was developed based on the exponential and Weibull distributions using the right and interval censoring types; and 2) when covariates were incorporated into the analysis through the scaleparameter of the exponential distribution only using the same types of data censoring. …”
    Get full text
    Get full text
    Thesis
  19. 19

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
    Get full text
    Monograph
  20. 20