Search Results - (( java adaptation optimization algorithm ) OR ( based filing based algorithm ))
Search alternatives:
- adaptation optimization »
- java adaptation »
- based filing »
- filing based »
-
1
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
2
Relationship based replication algorithm for data grid
Published 2014“…Data Grid is an infrastructure that manages huge amount of data files and provides intensive computational resources across geographically distributed systems.To increase resource availability and to ease resource sharing in such environment, there is a need for replication services.This research proposes a replication algorithm, termed as Relationship based Replication (RBR) that integrates users, grid and system perspective.In particular, the RBR includes information of three different relationships in identifying file(s) that requires replication; file-to-user, file-to-file and file-to-grid. …”
Get full text
Get full text
Monograph -
3
Confidentiality based file attributes and data classification using TsF-KNN
Published 2015“…The main objective of this study is to predict the confidential and non-confidential data of a file using K-NN algorithm. We also proposed a method called Training dataset Filtration Key Nearest Neighbour (TsF-KNN) classifier which classifies the data of file based on the confidentiality level of the schema of a file (file attributes). …”
Get full text
Get full text
Conference or Workshop Item -
4
MotionSure: a cloud-based algorithm for detection of injected object in data in motion
Published 2017“…Total 1600 different type of files were used for evaluation of the proposed algorithm, results show that 87% of injected objects were correctly detected…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
5
A log file analysis technique using binary-based approach
Published 2014“…In this research paper, a binary-based approach for mining frequency of data items in database transaction log files is introduced. …”
Get full text
Get full text
Article -
6
Analytical studies and experimental examines for flooding-based search algorithms
Published 2012“…To improve this searching scheme and reduce redundant messages, there are many flooding-based search algorithms in literature. This pa- per provided analytical study for flooding and flooding-based algorithms. …”
Get full text
Book Section -
7
Extreme learning machine classification of file clusters for evaluating content-based feature vectors
Published 2018“…Consequently, an Extreme Learning Machine (ELM) neural network algorithm is used to evaluate the performance of the three methods in which it classifies the class label of the feature vectors to JPEG and Non-JPEG images for files in different file formats. …”
Get full text
Article -
8
Concealment of files blocked by Gmail with EOF-based image steganography
Published 2018“…Based on the tests performed, the application can insert Gmail-blocked file system to the image cover file, without changing the physical bit of the image cover file or file system that inserted with 100% success rate. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
The development of semantic meta-database: an ontology based semantic integration of biological databases
Published 2007“…The tool comprises two intelligent algorithms. The first algorithm combines parallel genetic algorithm with the split-and-merge algorithm. …”
Get full text
Get full text
Monograph -
10
Improved rsync algorithm to minimize communication cost using multi-agent systems for synchronization in multi-learning management systems
Published 2017“…Remote file synchronization (RFS) is based on updating the outdated version of a file that resides on one machine to be similar to the new version of the updated file in another machine at a minimum computation time (cost). …”
Get full text
Get full text
Get full text
Thesis -
11
Enhanced Storage Mechanism for Secured Parallel Network File System
Published 2018“…The challenges faced translates how the new techniques, lease and delegation algorithm for file locking, snapshot enabled locks and layouts for data state, integration of highly secured Kerberos security on storage for pNFS locks and layouts, data block size algorithm enabled deduplication on file, block and object patterns and the redundant array of independent disk data protection can create impact on storage computing system. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Development of the Multipurpose Integrated Multimedia Presentation System Based on the CCM Algorithm
Published 2010“…Nevertheless commonly people use a different application for presenting those each multimedia element files type. This paper describes a multipurpose integrated multimedia presentation system (IMPS) based on channel controller model (CCM) algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
13
Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects
Published 2018“…Hence, a validation protocol algorithm based on hash function labelling provides a one-time security header for transferable files that protects data in transit against any unauthorized injection. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
File integrity monitor scheduling based on file security level classification
Published 2011“…Files are divided based on their security level group and integrity monitoring schedule is defined based on related groups. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Classification of JPEG files by using extreme learning machine
Published 2018“…The algorithm automatically classifies the files based on evaluation measures of three methods Entropy, Byte Frequency Distribution and Rate of Change. …”
Get full text
Get full text
Article -
16
The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment
Published 2004“…The objective of this research in primarily to find the best fit crytography system that can encrypt and decrypt the extension file .doc, implement it in a simple application which works similar to email and construct and run a set of evaluation to securing plaintext file in a web based environment. …”
Get full text
Get full text
Get full text
Thesis -
17
Stray animal complaint system using geolocation technique with rule-based Algorithm / Albin Lemuel Kushan … [et al.]
Published 2021“…In addition to that, geolocation technique is implemented to provide a better information in terms of the complainant’s location, and together with the utilization of a rule-based algorithms based on priority to provide the local council a better insight on the issue. …”
Get full text
Get full text
Get full text
Book Section -
18
Effect of file sizes on encryption and decryption in constrained devices / Nurnadia Sapri
Published 2015“…Therefore, the effect of file sizes on encryption and decryption in constrained devices have been analyzed using two types of cryptographic algorithm which is AES-128 (symmetric-key encryption) and RSA- 2048 (asymmetric-key encryption) based on the different file size, execution time, and the throughput. …”
Get full text
Get full text
Thesis -
19
-
20
Data depublication using : Hashing algorithm / Naimah Nayan
Published 2019“…There were two type of dataset which is video and document files with four different sizes. The time taken of the hashing algorithm generate the hash value were recorded. …”
Get full text
Get full text
Thesis
