Search Results - (( data replication study algorithm ) OR ( java implementation learning algorithm ))
Search alternatives:
- implementation learning »
- java implementation »
- learning algorithm »
- replication study »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
Online Dynamic Replication and Placement Algorithms for Cost Optimization of Online Social Networks in Two-tier Multi-cloud
Published 2024journal::journal article -
3
Binary Vote Assignment on Cloud Quorum Algorithm for Fragmented MyGRANTS Database Replication
Published 2015“…Data replication is one of the mechanisms to manage data since it improves data accessibility and reliability. …”
Get full text
Get full text
Get full text
Article -
4
Online dynamic replication and placement algorithms for cost optimization of online social networks in two-tier multi-cloud
Published 2024“…Two algorithms are proposed to adapt the replication and placement of the data object according to its popularity in the OSN. …”
Get full text
Get full text
Get full text
Article -
5
Managing MyGRANTS Fragmented Database Using Binary Vote Assignment Grid Quorum with Association Rule (BVAGQ-AR) Replication Model
Published 2015“…Replication is one of the mechanisms managing data since it improves data access and reliability. …”
Get full text
Get full text
Conference or Workshop Item -
6
An adaptive data replication and placement for efficient data storage of online social networks using two-tier multi-cloud environment
Published 2022“…Two algorithms are proposed to adapt the replication and placement of the data object according to its popularity in the OSN. …”
Get full text
Get full text
Article -
7
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
9
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
10
Dynamic replication aware load blanced scheduling in distributed environment / Said Bakhshad
Published 2018“…Several algorithms have been proposed and studied for scheduling and data replication, however a little research has been done so far on capturing and minimizing the migration rate of data from an existing available replica site to a next site on the basis of data scheduling in order to minimize the transfers and deletion rate. …”
Get full text
Get full text
Get full text
Thesis -
11
A bibliometric analysis: AI-driven data placement optimization in cloud replication environments
Published 2024“…Several studies have examined this area, aiming to enhance data replication techniques by integrating AI algorithms. …”
Get full text
Get full text
Get full text
Article -
12
Enhanced replication strategy with balanced quorum technique and data center selection method in cloud environment
Published 2022“…In order to mitigate the issues, ‘cloud data replication’ is commonly implemented for better data performance and promising business continuity. …”
Get full text
Get full text
Thesis -
13
Ancestral dynamic voting algorithm for mutual exclusion in partitioned distributed systems
Published 2013“…Data replication is a known redundancy used in fault-tolerant distributed system. …”
Get full text
Get full text
Get full text
Article -
14
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
15
Multi-factor replica placement strategy for resource failure extenuation in cloud replication environment
Published 2025“…Delay in data access and data loss can affect overall system performance, which is why cloud providers often rely on replication strategies to store multiple copies of data in different locations. …”
Get full text
Get full text
Get full text
Article -
16
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
17
Re-engineering grid-based quorum replication into binary vote assignment on cloud: A scalable approach for strong consistency in cloud databases
Published 2025“…The study establishes BVAC as an advancement in distributed data management and a foundation for future adaptive and multi-cloud replication frameworks.…”
Get full text
Get full text
Get full text
Article -
18
-
19
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
20
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item
