Search Results - (( data generation storage algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    Data depublication using : Hashing algorithm / Naimah Nayan by Nayan, Naimah

    Published 2019
    “…With the rapid growth of digital data that generated in the digital world, the capacity of storage usage will increase rapidly. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Stochastic And Modified Sequent Peak Algorithm For Reservoir Planning Analysis Considering Performance Indices by Oskoui, Issa Saket

    Published 2016
    “…This study is on modeling the critical period and total storage capacity of reservoir systems employing performance criteria and synthetic data generation technique. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Real-time Cascading Reservoirs Operation using the Genetic Algorithm and Seasonally Varied Models by DERIB ASFAW, TILAHUN

    Published 2013
    “…The fitness function of the genetic algorithm model (GAM) was to minimize the difference between the potential capacity and actual generation of the scheme. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Power management system for smart microgrid considering meteorological and load demand data / Sam Koohikamali by Sam , Koohikamali

    Published 2015
    “…An algorithm is also proposed which helps to precisely design the battery energy storage plant. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A novel peak load shaving algorithm for isolated microgrid using hybrid PV-BESS system by Rana, M.M., Romlie, M.F., Abdullah, M.F., Uddin, M., Sarkar, M.R.

    Published 2021
    “…To evaluate the effectiveness of the algorithm, simulation case studies have been conducted with actual load data and actual PV generation data. …”
    Get full text
    Get full text
    Article
  6. 6
  7. 7
  8. 8

    An enhanced soft set data reduction using decision partition order technique by Mohammed, Mohammed Adam Taheir

    Published 2017
    “…Besides, the need of extra memory is essential as redundant data makes use of storage and produce redundant copies due to its widespread use. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    The Bacterial Foraging Optimisation Algorithm using Prototype Selection and Prototype Generation for Data Classification by Faizol, Bin Mohd Suria

    Published 2020
    “…Therefore, we conclude that the proposed BFOA-G is the best algorithm in the study, and PG approach is recommended for further development of BFOA as an IS algorithm.…”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Improved genetic algorithm for scheduling divisible data grid application by Kaid, Monir Abdullah Abduh, Othman, Mohamed, Ibrahim, Hamidah, K. Subramaniam, Shamala

    Published 2007
    “…Data Grid technology promises geographically distributed scientists to access and share physically distributed resources such as computing resources, networks, storages, and most importantly data collections for large scale data intensive problems. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13

    Secret sharing scheme for key management of secure data sharing in cloud by Abd Majid, Noorhafezan

    Published 2019
    “…One of the known issues in cloud storage is the high key generation time for large-scale users and limiting the use of cryptography for data encryption. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Study on sparseness effects over NMF applied for automatic text summarization by Batcha, Nowshath Kadhar, Murugesan, Raja Kumar, A. Aziz, Normaziah

    Published 2012
    “…While, storage capability relates to the extent of data reduction process achieved by NMF. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  16. 16

    Review of wavelet theory and its application to image data compression by Khalifa, Othman Omran

    Published 2003
    “…Advantages over Fourier transform is investigated and several results are derived. The pyramid algorithm is also presented and some features of wavelets in image data compression are given. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Key generation technique based on triangular coordinate extraction for hybrid cubes by Mushtaq, Muhammad Faheem, Jamel, Sapiee, Mohamad, Kamaruddin Malik, Ahmad Khalid, Shamsul Kamal, Mat Deris, Mustafa

    Published 2017
    “…Cryptographic algorithms play an important role in information security where it ensures the security of data across the network or storage. …”
    Get full text
    Get full text
    Article
  19. 19

    A Comparative Analysis of Peak Load Shaving Strategies for Isolated Microgrid Using Actual Data by Rana, M.M., Rahman, A., Uddin, M., Sarkar, M.R., Shezan, S.A., Ishraque, M.F., Rafin, S.M.S.H., Atef, M.

    Published 2022
    “…Actual variable load data and PV generation data are considered to conduct the simulation case studies which are col-lected from a real IMG system. …”
    Get full text
    Get full text
    Article
  20. 20

    Join query enhancement processing (jqpro) with big rdf data on a distributed system using hashing-merge join technique by Nahla Mohammedelzein, Elawad Babiker

    Published 2021
    “…The effective storage and data retrieval, which could be applied to high amounts of possible schema-less data, has also proven exceedingly difficult for RDF data storage. …”
    Get full text
    Get full text
    Thesis