Search Results - (( data replication techniques algorithm ) OR ( java implementation level algorithm ))
Search alternatives:
- replication techniques »
- implementation level »
- java implementation »
- level algorithm »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
2
Binary vote assignment on grid quorum replication technique with association rule
Published 2018“…The main feature of BV AGQ-AR is that the technique integrates replication and data mining technique allowing meaningful extraction of knowledge from large data sets. …”
Get full text
Get full text
Thesis -
3
Improving response time, availability and reliability through asynchronous replication technique in cluster architecture of web server cluster
Published 2010“…This paper proposes an algorithm of data replication scheme based on asynchronous replication in order to improve web server cluster system reliability. …”
Get full text
Get full text
Conference or Workshop Item -
4
Enhanced replication strategy with balanced quorum technique and data center selection method in cloud environment
Published 2022“…Besides, there are also issues that arise during data placement techniques consuming extensive space and high replication time due to replica copies located in every storage node in the same cluster environment to achieve high data availability. …”
Get full text
Get full text
Thesis -
5
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…For many reasons, businesses or specially enterprise business or industrial business use replication. Therefore, replication is a useful technique for distributed systems. …”
Get full text
Get full text
Thesis -
6
Fault Tolerence on Binary Vote Assignment Cloud Quorum (BVACQ) Replication Technique
Published 2013“…This technique combines the replication and fault tolerant mechanism. …”
Get full text
Get full text
Conference or Workshop Item -
7
Efficient access of replicated data in distributed database systems
Published 2001“…The system combines the replication and transaction techniques and embeds these techniques into the TDGS-RP system. …”
Get full text
Get full text
Thesis -
8
A dynamic replication aware load balanced scheduling for data grids in distributed environments of internet of things
Published 2018“…Moreover, it becomes even more challenging in the highly dynamic and distributed environment of the Internet of Things (IoT). Replication is considered a key optimization technique in data grids. …”
Get full text
Get full text
Article -
9
Fault Tolerance On Binary Vote Assignment Cloud Quorum (BVACQ) Replication Technique
Published 2013“…This technique combines the replication and fault tolerant mechanism. …”
Get full text
Get full text
Conference or Workshop Item -
10
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
11
A bibliometric analysis: AI-driven data placement optimization in cloud replication environments
Published 2024“…Several studies have examined this area, aiming to enhance data replication techniques by integrating AI algorithms. …”
Get full text
Get full text
Get full text
Article -
12
Vigorous replication strategy with balanced quorum for minimizing the storage consumption and response time in cloud environments
Published 2021“…Essentially, cloud replication must be able to secure huge data by enabling comprehensive replication strategies, optimal data availability, fast data retrieval, and cost-effective data management and maintenance. …”
Get full text
Get full text
Article -
13
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
14
A technique of dispatching algorithms for web-server cluster
Published 2011Get full text
Working Paper -
15
Exploration of machine learning forecasting methods in M4 competition / Muhammad Halim Hamdan and Shuzlina Abdul-Rahman
Published 2021“…There are so many forecasting algorithms and techniques available. The abilities of Data Mining to obtain and gather data from multiple sources is very useful to researcher, practitioner, business and more. …”
Get full text
Get full text
Get full text
Article -
16
Development of read-one-write-all synchronization transaction daemon (row A-STD) in distributed system
Published 2010“…In distributed system environment, replicated data is the current trend to keep data updated in multiple sites. …”
Get full text
Get full text
Research Report -
17
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis -
18
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
Get full text
Get full text
Journal -
19
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
20
Optimize performance load balancing techniques using binary vote assignment grid quorum (BVAGQ): A systematic review
Published 2019Get full text
Get full text
Get full text
Conference or Workshop Item
