Search Results - (( data distribution computer algorithm ) OR ( data distribution rate algorithm ))
Search alternatives:
- distribution computer »
- data distribution »
- distribution rate »
- rate algorithm »
-
1
Data discovery algorithm for scientific data grid environment
Published 2005“…Data grid mostly deals with large computational problems and provides geographically distributed resources for large-scale data-intensive applications that generate large data sets. …”
Get full text
Get full text
Get full text
Article -
2
Dynamic replication aware load blanced scheduling in distributed environment / Said Bakhshad
Published 2018“…Grid computing is an effective distributed and adaptable processing network that manages a huge number of data applications. …”
Get full text
Get full text
Get full text
Thesis -
3
Estimation Of Weibull Parameters Using Simulated Annealing As Applied In Financial Data
Published 2023“…The present study proposes a simulated annealing algorithm (SA) in estimating the parameters of Weibull distribution with application to modified internal rate of return data (MIRR).The objective is to examine the investment potential of the shari’ah compliance companies of the Malaysia property sector (MPS). …”
Get full text
Get full text
Thesis -
4
Static and self-scalable filter range selection algorithms for peer-to-peer networks
Published 2011“…These algorithms are based on the statistical knowledge about the uniform distribution nature of the data and arranged in certain order in the file. …”
Get full text
Get full text
Thesis -
5
BVAGQ-AR for Fragmented Database Replication Management
Published 2021“…Large amounts of data have been produced at a rapid rate since the invention of computers. …”
Get full text
Get full text
Get full text
Article -
6
Traffic management algorithms for LEO satellite networks
Published 2016“…The important parameters measured in the simulation are delay rate, throughput rate and fair traffic distribution rate. …”
Get full text
Get full text
Get full text
Thesis -
7
-
8
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Get full text
Thesis -
9
Design and analysis of management platform based on financial big data
Published 2023“…In order to make financial big data generate business value and improve the information application level of financial management, aiming at the high error rate of current financial data classification system, this article adopts the fuzzy clustering algorithm to classify financial data automatically, and adopts the local outlier factor algorithm with neighborhood relation (NLOF) to detect abnormal data. …”
Get full text
Get full text
Get full text
Article -
10
A Continuous Overlay Path Probing Algorithm For Overlay Networks
Published 2013“…Knowledge about the available bandwidth of an overlay path enables dynamic rate adoption and better bandwidth utilization by content distribution schemes in overlay networks. …”
Get full text
Get full text
Thesis -
11
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
12
Statistical fixed range multiple selection algorithm for peer-to-peer system
Published 2010“…This algorithm is developed based on the statistical knowledge about the uniform distribution nature of the data which has been arranged in ascending order in the local file. …”
Get full text
Get full text
Conference or Workshop Item -
13
Static range multiple selection algorithm for peer-to-peer system
Published 2011“…This algorithm is developed based on the statistical knowledge about the uniform distribution nature of the data which has been arranged according to certain order in the file. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Monograph -
15
An enhanced version of black hole algorithm via levy flight for optimization and data lustering problems
Published 2019“…The experimental outcomes obtained indicated the designed algorithm’s suitability for data clustering, displaying effectiveness and robustness.…”
Get full text
Get full text
Get full text
Article -
16
Parallel power load abnormalities detection using fast density peak clustering with a hybrid canopy-K-means algorithm
Published 2025“…Data vectors are generated based on the time needed, sequential and parallel candidate feature data are obtained, and the data rate is combined. …”
Article -
17
Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment
Published 2024“…Electric power production data has the characteristics of massive data scale, high update frequency and fast growth rate. …”
Article -
18
An improved dynamic load balancing for virtualmachines in cloud computing using hybrid bat and bee colony algorithms
Published 2021“…The proposed HBAC showed an improved accuracy rate in task distribution and reduced the makespan of VM in a cloud data center. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem
Published 2016“…Algorithmic level based methods however are based on introducing new optimization task to improve the minority class classification rate, without changing the data characteristics. …”
Get full text
Get full text
Get full text
Thesis -
20
Classification of JPEG files by using extreme learning machine
Published 2018“…The algorithm automatically classifies the files based on evaluation measures of three methods Entropy, Byte Frequency Distribution and Rate of Change. …”
Get full text
Get full text
Article
