Performance analysis in a probabilistic re-entrant for an environmental stress testing operation
This paper presents an extended approximation model based on mean value analysis (MVA) technique for a probabilistic re-entrant line. The objective is to develop a solution method to determine the total cycle time and mean throughput of the environmental stress testing (EST) operation for a given nu...
| Main Authors: | OMAR, M, KUMAR, S |
|---|---|
| Format: | Article |
| Published: |
PERGAMON-ELSEVIER SCIENCE LTD
2008
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/2740/ |
Similar Items
Performance measure in a probabilistic re-entrant stress testing line
by: Kumar, , S, et al.
Published: (2005)
by: Kumar, , S, et al.
Published: (2005)
Establishing a Probabilistic Model for Cognitive Learning Style
by: Teh, Yoke-Jin, et al.
Published: (2005)
by: Teh, Yoke-Jin, et al.
Published: (2005)
Probabilistic Learner Modeling in Scientific Inquiry Exploratory Learning Environment
by: Ting, , Choo-Yee, et al.
Published: (2005)
by: Ting, , Choo-Yee, et al.
Published: (2005)
Probabilistic ensemble simplified fuzzy ARTMAP for sonar target differentiation
by: Loo, Chu Kiong, et al.
Published: (2006)
by: Loo, Chu Kiong, et al.
Published: (2006)
Autonomous and deterministic probabilistic neural network using global k-means
by: Chang, Roy Kwang Yang, et al.
Published: (2006)
by: Chang, Roy Kwang Yang, et al.
Published: (2006)
Accurate and reliable diagnosis and classification using probabilistic ensemble simplified fuzzy ARTMAP
by: Loo, C.K., et al.
Published: (2005)
by: Loo, C.K., et al.
Published: (2005)
Probabilistic random projections and speaker verification
by: Ying, Chong Lee, et al.
Published: (2007)
by: Ying, Chong Lee, et al.
Published: (2007)
Compatibility of biometric strengthening with probabilistic neural network
by: Shih-Yin, Ooi, et al.
Published: (2008)
by: Shih-Yin, Ooi, et al.
Published: (2008)
Ad Hoc Wireless Routing With Density Based Probabilistic Algorithm For Mobile Wireless Networks With Non-Uniform Node Distribution
by: Ong , Hean Loong
Published: (2010)
by: Ong , Hean Loong
Published: (2010)
Speaker verification using probabilistic 2D CLAFIC
by: Ying, Chong Lee, et al.
Published: (2007)
by: Ying, Chong Lee, et al.
Published: (2007)
2D CLAFIC Subspace Technique in Probabilistic Speaker Verification
by: Chong, L. Y., et al.
Published: (2007)
by: Chong, L. Y., et al.
Published: (2007)
Network performance testing on VM based autonomous web server
by: Mas'ud, M. Zaki, et al.
Published: (2006)
by: Mas'ud, M. Zaki, et al.
Published: (2006)
Unreliable Network Re-Authentication Protocol Based On Hybrid Key Using CSP Approach.
by: Ramadass, Sureswaran, et al.
Published: (2007)
by: Ramadass, Sureswaran, et al.
Published: (2007)
Performance Analysis Of A Probalistic Re-Entrant Line In An Environment Stress Testing Operation
by: -, Suresh Kumar
Published: (2007)
by: -, Suresh Kumar
Published: (2007)
CST132 - OPERATING SYSTEMS APRIL 08.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
CTS 301 - OPERATING SYSTEMS - SEPT. 2002
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2002)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2002)
CST232 – Operating Systems (Sistem Pengendalian)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
CST232 – Operating Systems January 2018
by: PPSKOM, Pusat Pengajian Sains Komputer
by: PPSKOM, Pusat Pengajian Sains Komputer
CST232 – Operating Systems (Sistem Pengendalian)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2022)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2022)
CST232 – Operating Systems
(Sistem Pengendalian)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2023)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2023)
Related-mode attacks on block cipher modes of operation
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
CPT441- Software Quality Assurance & Testing
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2019)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2019)
On the security bounds of CMC, EME, EME(+) and EME* - Modes of operation
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
CST232/CST132 – OPERATING SYSTEMS NOV 2010
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2010)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2010)
CST232-CST132 - OPERATING SYSTEMS JANUARY 2012
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2012)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2012)
CST232 – Operating Systems (December 2019 / January 2020)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2020)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2020)
Analysis Of Feature Reduction Algorithms To Estimate
Human Stress Conditions
by: Arasu, Darshan Babu
Published: (2022)
by: Arasu, Darshan Babu
Published: (2022)
Development Of Penetration Testing Model For Increasing Network Security.
by: Budiarto, Rahmat, et al.
Published: (2004)
by: Budiarto, Rahmat, et al.
Published: (2004)
CST 102 - INTRODUCTION TO OPERATING SYSTEMS & DATA COMMUNICATIONS OKT 04
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2004)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2004)
POSFinger: A New Fingerprint For Passive Remote Operating System Identification.
by: Manasrah, Ahmad, et al.
Published: (2007)
by: Manasrah, Ahmad, et al.
Published: (2007)
CST102 - INTRODUCTION TO OPERATING SYSTEMS & DATA COMMUNICATIONS APRIL 08.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
CST102 - INTRODUCTION TO OPERATING SYSTEMS AND DATA COMMUNICATIONS - SEPT. 2002
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2002)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2002)
CST 102 - INTRODUCTION TO OPERATING SYSTEMS AND DATA COMMUNICATIONS - OKT. 2004
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2004)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2004)
CST232 – OPERATING SYSTEMS [SISTEM PENGENDALIAN] DEC. 2016 - JAN. 2017
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2017)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2017)
E-Shopping With Drive-Through (Eway):
Effective Drive-Through Operation For Eway
by: Guan, Huoi Ying
Published: (2010)
by: Guan, Huoi Ying
Published: (2010)
CST232 – OPERATING SYSTEMS [SISTEM PENGENDALIAN] DEC. 2014 - JAN. 2015
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2015)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2015)
CST232 – OPERATING SYSTEMS [SISTEM PENGENDALIAN]
DEC. 2015 - JAN. 2016
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2016)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2016)
CPT441 – Software Quality Assurance & Testing June 2018
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2018)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2018)
Role of human-computer interaction factors as moderators of occupational stress and work exhaustion
by: Anantharaman, Reddiyoor Narayanaswamy
Published: (2005)
by: Anantharaman, Reddiyoor Narayanaswamy
Published: (2005)
Optimal Design Of Femoral Hip Prosthesis Using Topology
Optimisation To Reduce Stress Shielding
by: Ridzwan, Mohamad Ikhwan Zaini
Published: (2005)
by: Ridzwan, Mohamad Ikhwan Zaini
Published: (2005)
Similar Items
-
Performance measure in a probabilistic re-entrant stress testing line
by: Kumar, , S, et al.
Published: (2005) -
Establishing a Probabilistic Model for Cognitive Learning Style
by: Teh, Yoke-Jin, et al.
Published: (2005) -
Probabilistic Learner Modeling in Scientific Inquiry Exploratory Learning Environment
by: Ting, , Choo-Yee, et al.
Published: (2005) -
Probabilistic ensemble simplified fuzzy ARTMAP for sonar target differentiation
by: Loo, Chu Kiong, et al.
Published: (2006) -
Autonomous and deterministic probabilistic neural network using global k-means
by: Chang, Roy Kwang Yang, et al.
Published: (2006)