Search Results - (( based replication selection algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    A framework for implementing asynchronous replication scheme in utility-based computing environment by Wan Nor Shuhadah, W.N., Zhou, B.B., Zomaya, A.Y., Abawajy, J.H.

    Published 2016
    “…This paper addresses a problem on implementing an asynchronous replication scheme in utility-based computing environment. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    A Framework for Asynchronous Replication Scheme for Utility-based Computing Environment by Wan Nor Shuhadah, Wan Nik, Zhou, Bing Bing, Zomaya, Albert Y

    Published 2015
    “…This paper addresses a problem on implementing an asynchronous replication scheme in utility-based computing environment. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Replica Creation Algorithm for Data Grids by Madi, Mohammed Kamel

    Published 2012
    “…Current algorithms focus on number of accesses in deciding which file to replicate and where to place them, which ignores resources’ capabilities. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    A Novel Wrapper-Based Optimization Algorithm for the Feature Selection and Classification by Talpur, N., Abdulkadir, S.J., Hasan, M.H., Alhussian, H., Alwadain, A.

    Published 2023
    “…The SCSO algorithm replicates the hunting and searching strategies of the sand cat while having the advantage of avoiding local optima and finding the ideal solution with minimal control variables. …”
    Get full text
    Get full text
    Article
  5. 5

    A cluster-based hybrid replica control protocol for high availability in data grid by Mabni, Zulaile

    Published 2019
    “…Another proposed algorithm is replica placement algorithm which selects and places only one replica in each cluster. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  8. 8

    GREEDY SINGLE USER AND FAIR MULTIPLE USERS' REPLICA SELECTION DECISION IN DATA GRID by SALIM JARADAT, AYMAN KAMEL

    Published 2013
    “…Replicas of datasets are usually distributed to different sites, and the choice of any replica locations has a significant impact. Replica selection algorithms decide the best replica places based on some criteria. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Towards a self-adaptive agent-based simulation model by Loo Y.L., Tang A.Y.C., Ahmad A., Mustapha A.

    Published 2023
    “…To address this issue, this paper proposes a self-adaptive ABS model that is capable of modelling cross-domain phenomena by selecting the required parameters based on the environment. …”
    Article
  10. 10

    A sequential handwriting recognition model based on a dynamically configurable convolution recurrent neural network and hybrid salp swarm algorithm by Ahmed Ali Mohammed, Al-saffar

    Published 2024
    “…This research present a dynamic configurator of the CRNN (DC-CRNN), geared for sequence learning in the context of handwriting recognition, inspired by bio-inspired approaches. The built DCCRNN is based on the Salp Swarm optimization Algorithm (SSA), a processor that given a particular dataset will find the best CRNN’s structure and hyperparameters. …”
    Get full text
    Get full text
    Thesis
  11. 11

    An enhanced fingerprint template protection scheme by Siswanto, Apri

    Published 2022
    “…The results demonstrate that the enhanced chaos-based encryption algorithm for FTP improves its encryption time, which is 0.24 seconds faster than the selected benchmark study. …”
    Get full text
    Get full text
    Thesis
  12. 12

    A Novel Path Prediction Strategy for Tracking Intelligent Travelers by Motlagh, Omid Reza Esmaeili

    Published 2009
    “…The FCM nodes are a novel selection of kinematical factors. Genetic algorithm (GA) is then used to train the FCM to be able to replicate the decisional behaviors of the intelligent traveler. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Mobile Crowd Steering Evacuation Model via Agent Based Simulation by Applying the Social Force Model by Norhaida, Binti Hussain, Wai Shiang, Cheah, Wai Loke, Seng

    Published 2025
    “…The communication model is added to the simulation model to demonstrate the use of word-of-mouth during evacuation. A role selection algorithm chooses the leader before the evacuation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    A framework for automatic modelling of survival using fuzzy inference. by Hamdan, Hazlina, Garibaldi, Jonathan M.

    Published 2012
    “…After the initialisation of the fuzzy inference structure, the replication data (until time to event) will be subject to be trained using the gradient descent and nonnegative least square algorithm to estimate the conditional event probability. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Signal to noise ratio as a guideline to obtain valid auditory brainstem response results by Dzulkarnain, Ahmad Aidil Arafat

    Published 2020
    “…In certain evoked potential system, response replication analysis is being provided statistically also known as cross-correlation. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    3D imaging techniques in documentation of cultural assets in Malaysia by Md. Sharif, Harlina, Hazumi, Hazman, Saedin, Nurfarhanah

    Published 2015
    “…This paper presents an initial stage in an exploratory study that investigates the potentials of using CV automated image-based open- source software and web services to reconstruct and replicate cultural assets. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Comparison between specifications of linear regression and spatial-temporal autoregressive models in mass appraisal valuation for single storey residential property by Jahanshiri, Ebrahim

    Published 2013
    “…The experiments were replicated on three different treatments based on removal of outliers and transformation of variables with high value of skewness. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A guided artificial bee colony (GABC) heuristic for permutation flowshop scheduling problem (PFSP) by Sidek, Noor Azizah

    Published 2021
    “…The study experimented according to ten datasets of Taillard benchmark and divided the experiments into several categories and the experiments run every data for several iterations, and for each dataset, there are 20 replications. This study compared the performance of NEH, ABC, NEH-based ABC and GABC, which also act as the validation process. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis