Search Results - (( data replication path algorithm ) OR ( data validation using algorithm ))

Refine Results
  1. 1
  2. 2

    A Novel Path Prediction Strategy for Tracking Intelligent Travelers by Motlagh, Omid Reza Esmaeili

    Published 2009
    “…The system is then used in path prediction mode for reconstructing the missing parts of the trajectory when actual positioning data is unavailable. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Re-engineering grid-based quorum replication into binary vote assignment on cloud: A scalable approach for strong consistency in cloud databases by Ainul Azila Che Fauzi, Ainul Azila, Noor Ashafiqa, Noor Ashafiqa, Asiah Mat, Asiah, Syerina Azlin Md Nasir, Syerina Azlin, A. Noraziah, Noraziah

    Published 2025
    “…Experimental results demonstrate that BVAC sustains fault tolerance, achieves cloud database replication efficiency, and sustains high data availability via multiple valid quorum paths. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Proactive multi-copy routing protocol for urban vehicular ad hoc network by Hassan, Aslinda, Bahaman, Nazrulazhar

    Published 2016
    “…The paper emphases on replicating data packets and distribute them to different relays. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Proactive multi-copy routing protocol for urban vehicular ad hoc network by Hassan, Aslinda, Bahaman, Nazrulazhar

    Published 2015
    “…The paper emphases on replicating data packets and distribute them to different relays. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Implementation of New Improved Round Robin (NIRR) CPU scheduling algorithm using discrete event simulation by Chang, Jan Voon

    Published 2015
    “…Round Robin scheduling algorithm is the most widely used scheduling algorithm because of its simplicity and fairness. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Revolutionizing energy infrastructure: Automated route planning for underground transmission lines in Phnom Penh by Saing, Kimlin, Goh, Hui Hwang, Zhang, Dongdong, Dai, Wei, Kurniawan, Tonni Agustiono, Goh, Kai Chen

    Published 2024
    “…Multiple algorithms are evaluated to identify the most effective solution to this design’s inherent shortest-path problem. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Prediction of Machine Failure by Using Machine Learning Algorithm by Fakhrurazi, Nur Amalina

    Published 2019
    “…The columns consist of the variables that record the reading of machine sensor tags. Validation for the model is analyzed by using validation testing data and cross validation. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects by Olanrewaju, Rashidah Funke, Islam, Thouhedul, Khalifa, Othman Omran, Fajingbesi, Fawwaz Eniola

    Published 2018
    “…Hence, a validation protocol algorithm based on hash function labelling provides a one-time security header for transferable files that protects data in transit against any unauthorized injection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Cluster validity of the fuzzy C-means algorithm in mammographic image using adaptive cluster & partition entropy indexes / Azwani Aziz by Aziz, Azwani

    Published 2010
    “…This problem can be solved by cluster validity index. Cluster validity index is needed to find the suitable number of cluster, c in any fuzzy clustering algorithm. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Implementation of New Improved Round Robin (NIRR) CPU scheduling algorithm using discrete event simulation by Chang, Jan Voon, Ahmad, Idawaty

    Published 2016
    “…Round Robin scheduling algorithm is the most widely used scheduling algorithm because of its simplicity and fairness [1]. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Validation on an enhanced dendrite cell algorithm using statistical analysis by Mohamad Mohsin, Mohamad Farhan, Hamdan, Abdul Razak, Abu Bakar, Azuraliza, Abd Wahab, Mohd Helmy

    Published 2017
    “…This study demonstrates the mechanism of evaluating an enhanced algorithm using performance metrics and validated it using statistical analysis. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    A case study of microarray breast cancer classification using machine learning algorithms with grid search cross validation by Mohd Ali, Nursabillilah, Besar, Rosli, Ab Aziz, Nor Azlina

    Published 2023
    “…Machine learning is a subfield of artificial intelligence (AI) and computer science that uses data and algorithms to mimic how humans learn, and gradually improving its accuracy. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Text Extraction Algorithm for Web Text Classification by Theab, Mustafa Muwafak

    Published 2010
    “…A text extraction prototype is built using Visual C# 2008 to validate the algorithm. It is a windows application mixed with web connection protocol. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi by Rahimi, Ahmad Faris

    Published 2017
    “…Testing of the application are using 10-Fold Cross Validation technique. 90% of the data be used as a training and another 10% be used for the testing part. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Job position prediction based on skills and experience using machine learning algorithm / Ezaryf Hamdan by Hamdan, Ezaryf

    Published 2024
    “…Text preprocessing ensures consistent data representation and facilitates validation. The Machine Learning algorithm, comprising Random Forest, Linear Regression, XGBoost, SVM, and Stacking Ensemble, is embedded in the system for job position predictions based on the analysed data. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Cluster Analysis of Data Points using Partitioning and Probabilistic Model-based Algorithms by Raheem, Ajiboye Adeleke, Hauwau, Isah-Kebbe, O., Oladele Tinuke

    Published 2014
    “…Experiments were conducted using k-means, k-medoids and EM-algorithm. The study implements each algorithm using RapidMiner Software and the results generated was validated for correctness in accordance to the concept of external criteria method. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Detection of the spread of Covid-19 in Indonesia using K-Means Clustering Algorithm / Mohammad Yazdi Pusadan ... [et al.] by Pusadan, Mohammad Yazdi, Rabbani, Mohammad Abied, Ardiansyah, Rizka, Ngemba, Hajra Rasmita

    Published 2023
    “…The data source used as training data comes from the official Kaggle website, the data used in this study is data on the spread of the coronavirus collected from 2020 to 2021 with a total of 20,816 training data. …”
    Get full text
    Get full text
    Book Section