Search Results - (( data replication techniques algorithm ) OR ( java detection using algorithm ))
Search alternatives:
- replication techniques »
- using algorithm »
- java detection »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
3
Binary vote assignment on grid quorum replication technique with association rule
Published 2018“…The main feature of BV AGQ-AR is that the technique integrates replication and data mining technique allowing meaningful extraction of knowledge from large data sets. …”
Get full text
Get full text
Thesis -
4
Improving response time, availability and reliability through asynchronous replication technique in cluster architecture of web server cluster
Published 2010“…This paper proposes an algorithm of data replication scheme based on asynchronous replication in order to improve web server cluster system reliability. …”
Get full text
Get full text
Conference or Workshop Item -
5
Enhanced replication strategy with balanced quorum technique and data center selection method in cloud environment
Published 2022“…Besides, there are also issues that arise during data placement techniques consuming extensive space and high replication time due to replica copies located in every storage node in the same cluster environment to achieve high data availability. …”
Get full text
Get full text
Thesis -
6
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…For many reasons, businesses or specially enterprise business or industrial business use replication. Therefore, replication is a useful technique for distributed systems. …”
Get full text
Get full text
Thesis -
7
Fault Tolerence on Binary Vote Assignment Cloud Quorum (BVACQ) Replication Technique
Published 2013“…This technique combines the replication and fault tolerant mechanism. …”
Get full text
Get full text
Conference or Workshop Item -
8
Efficient access of replicated data in distributed database systems
Published 2001“…The system combines the replication and transaction techniques and embeds these techniques into the TDGS-RP system. …”
Get full text
Get full text
Thesis -
9
A dynamic replication aware load balanced scheduling for data grids in distributed environments of internet of things
Published 2018“…Moreover, it becomes even more challenging in the highly dynamic and distributed environment of the Internet of Things (IoT). Replication is considered a key optimization technique in data grids. …”
Get full text
Get full text
Article -
10
Fault Tolerance On Binary Vote Assignment Cloud Quorum (BVACQ) Replication Technique
Published 2013“…This technique combines the replication and fault tolerant mechanism. …”
Get full text
Get full text
Conference or Workshop Item -
11
A bibliometric analysis: AI-driven data placement optimization in cloud replication environments
Published 2024“…Several studies have examined this area, aiming to enhance data replication techniques by integrating AI algorithms. …”
Get full text
Get full text
Get full text
Article -
12
Vigorous replication strategy with balanced quorum for minimizing the storage consumption and response time in cloud environments
Published 2021“…Essentially, cloud replication must be able to secure huge data by enabling comprehensive replication strategies, optimal data availability, fast data retrieval, and cost-effective data management and maintenance. …”
Get full text
Get full text
Article -
13
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Detection and extraction features for signatures images via different techniques
Published 2019Get full text
Get full text
Conference or Workshop Item -
15
A technique of dispatching algorithms for web-server cluster
Published 2011Get full text
Working Paper -
16
Exploration of machine learning forecasting methods in M4 competition / Muhammad Halim Hamdan and Shuzlina Abdul-Rahman
Published 2021“…There are so many forecasting algorithms and techniques available. The abilities of Data Mining to obtain and gather data from multiple sources is very useful to researcher, practitioner, business and more. …”
Get full text
Get full text
Get full text
Article -
17
Development of read-one-write-all synchronization transaction daemon (row A-STD) in distributed system
Published 2010“…In distributed system environment, replicated data is the current trend to keep data updated in multiple sites. …”
Get full text
Get full text
Research Report -
18
Identification of microcalcification in mammographic images / Noor Azliza Abdul Shauti
Published 2008“…By using this identification, it can simulate in flexible images post processing and analysis in easy image management using Java aplication. …”
Get full text
Get full text
Thesis -
19
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
Get full text
Get full text
Thesis -
20
Fitness value based evolution algorithm approach for text steganalysis model
Published 2013“…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
Get full text
Get full text
Article
