Search Results - (( data replication techniques algorithm ) OR ( java detection using algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Binary vote assignment on grid quorum replication technique with association rule by Ainul Azila, Che Fauzi

    Published 2018
    “…The main feature of BV AGQ-AR is that the technique integrates replication and data mining technique allowing meaningful extraction of knowledge from large data sets. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Improving response time, availability and reliability through asynchronous replication technique in cluster architecture of web server cluster by Aznida Hayati, Zakaria@Mohamad, Ahmad Nazari, Mohd Rose, Zarina, Mohamad, Wan Suryani, Wan Awang

    Published 2010
    “…This paper proposes an algorithm of data replication scheme based on asynchronous replication in order to improve web server cluster system reliability. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Enhanced replication strategy with balanced quorum technique and data center selection method in cloud environment by Mohd Ali, Fazlina

    Published 2022
    “…Besides, there are also issues that arise during data placement techniques consuming extensive space and high replication time due to replica copies located in every storage node in the same cluster environment to achieve high data availability. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…For many reasons, businesses or specially enterprise business or industrial business use replication. Therefore, replication is a useful technique for distributed systems. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Efficient access of replicated data in distributed database systems by Mat Deris, Mustafa

    Published 2001
    “…The system combines the replication and transaction techniques and embeds these techniques into the TDGS-RP system. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A dynamic replication aware load balanced scheduling for data grids in distributed environments of internet of things by Bakhshad, Said, Noor, Rafidah Md, Akhundzada, Adnan, Saba, Tanzila, Ahmedy, Ismail, Haroon, Faisal, Nazir, Babar

    Published 2018
    “…Moreover, it becomes even more challenging in the highly dynamic and distributed environment of the Internet of Things (IoT). Replication is considered a key optimization technique in data grids. …”
    Get full text
    Get full text
    Article
  10. 10
  11. 11
  12. 12

    Vigorous replication strategy with balanced quorum for minimizing the storage consumption and response time in cloud environments by Mohd Ali, Fazlina, Latip, Rohaya, Alrshah, Mohamed A., Abdullah, Azizol, Ibrahim, Hamidah

    Published 2021
    “…Essentially, cloud replication must be able to secure huge data by enabling comprehensive replication strategies, optimal data availability, fast data retrieval, and cost-effective data management and maintenance. …”
    Get full text
    Get full text
    Article
  13. 13

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15
  16. 16

    Exploration of machine learning forecasting methods in M4 competition / Muhammad Halim Hamdan and Shuzlina Abdul-Rahman by Hamdan, Muhammad Halim, Abdul-Rahman, Shuzlina

    Published 2021
    “…There are so many forecasting algorithms and techniques available. The abilities of Data Mining to obtain and gather data from multiple sources is very useful to researcher, practitioner, business and more. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Identification of microcalcification in mammographic images / Noor Azliza Abdul Shauti by Abdul Shauti, Noor Azliza

    Published 2008
    “…By using this identification, it can simulate in flexible images post processing and analysis in easy image management using Java aplication. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Fitness value based evolution algorithm approach for text steganalysis model by Din, Roshidi, Samsudin, Azman, Tuan Muda, Tuan Zalizam, Lertkrai, P., Amphawan, Angela, Omar, Mohd Nizam

    Published 2013
    “…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
    Get full text
    Get full text
    Article