Search Results - (( weibull distributions function algorithm ) OR ( java application server algorithm ))
Search alternatives:
- distributions function »
- weibull distributions »
- function algorithm »
- application server »
- java application »
- server algorithm »
-
1
Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah
Published 2015“…Empirical cumulative distribution function (CDF) model is presented in evaluating the real traffic distribution. …”
Get full text
Get full text
Article -
2
Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah
Published 2015“…Empirical cumulative distribution function (CDF) model is presented in evaluating the real traffic distribution. …”
Get full text
Get full text
Thesis -
3
Bayesian survival and hazard estimates for Weibull regression with censored data using modified Jeffreys prior
Published 2013“…For the Weibull model with right censoring and unknown shape, the full conditional distribution for the scale and shape parameters are obtained via Gibbs sampling and Metropolis-Hastings algorithm from which the survival function and hazard function are estimated. …”
Get full text
Get full text
Thesis -
4
Variational Bayesian inference for exponentiated Weibull right censored survival data
Published 2023“…This gap has necessitated the introduction of Exponentiated Weibull Distribution (EWD) that can accommodate both monotonic and non-monotonic hazard functions. …”
Get full text
Get full text
Get full text
Article -
5
-
6
Cash-flow analysis of a wind turbine operator
Published 2023“…Two-parameter Weibull type probability density function (PDF) is used to model wind profile at two locations. …”
Conference Paper -
7
Peak time bandwidth control algorithms with fitted traffic model on broadband network YouTube video traffic: article / Aini Azmi
Published 2016“…Results presents traffic characterizations are identified based on two (2) parameters Cumulative Distribution Functions (CDF) traffic model. Maximum Likelihood Estimator (MLE) technique is used to fit the best distribution model. …”
Get full text
Get full text
Article -
8
Peak time bandwidth control algorithms with fitted traffic model on broadband network YouTube video traffic / Aini Azmi
Published 2016“…Results presents traffic characterizations are identified based on two (2) parameters Cumulative Distribution Functions (CDF) traffic model. Maximum Likelihood Estimator (MLE) technique is used to fit the best distribution model. …”
Get full text
Get full text
Thesis -
9
Parametric and Semiparametric Competing Risks Models for Statistical Process Control with Reliability Analysis
Published 2004“…Various regression models with censored data are presented and we concentrate on four competing risks models namely, two parametric Cox’s model that is, Cox’s with Weibull distribution, Cox’s with exponential distribution and two semiparametric Cox’s model with subdistribution function that is, the weighted score function (W) and censoring complete (CC). …”
Get full text
Get full text
Thesis -
10
Network game (Literati) / Chung Mei Kuen
Published 2003“…Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
Get full text
Get full text
Thesis -
11
Reliability Analysis and Prediction of Time to Failure Distribution of an Automobile Crankshaft
Published 2015“…The developed stochastic algorithm has the capability to measure the parametric distribution function and validate the predict the reliability rate, mean time to failure and hazard rate. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Parameter estimation of Kumaraswamy Burr type X models based on cure models with or without covariates
Published 2017“…Further-more, one of the weakness of Beta distribution is that it is not fairly tractable and in a particular case, its cumulative distribution function (CDF) involves the incomplete beta function ratio. …”
Get full text
Get full text
Thesis -
13
-
14
Some families of count distributions for modelling zero-inflation and dispersion / Low Yeh Ching
Published 2016“…Two new mixed Poisson distributions, namely a three-parameter Poisson-exponentiated Weibull distribution and a fourparameter generalized Sichel distribution is introduced to model over dispersed, zeroinflated and long-tailed count data. …”
Get full text
Get full text
Thesis -
15
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
16
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
Get full text
Get full text
Thesis -
17
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
18
Non-Parametric and Parametric Estimations of Cure Fraction Using Right-and Interval-Censored Data
Published 2011“…In this case, the estimation was developed based on the exponential and Weibull distributions using the right and interval censoring types; and 2) when covariates were incorporated into the analysis through the scaleparameter of the exponential distribution only using the same types of data censoring. …”
Get full text
Get full text
Thesis -
19
-
20
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…On the basis of the results of this research, it can be concluded that the developed prototype had high accuracy and security when transferring the file between the sender and receiver that was implemented in client-server application. This research hopes to give a clear idea to the readers about ABS algorithm. …”
Get full text
Get full text
Undergraduates Project Papers
