Search Results - (( java application reoptimize algorithm ) OR ( based filing system algorithm ))
Search alternatives:
- application reoptimize »
- java application »
- system algorithm »
- filing system »
- based filing »
-
1
Relationship based replication algorithm for data grid
Published 2014“…Data Grid is an infrastructure that manages huge amount of data files and provides intensive computational resources across geographically distributed systems.To increase resource availability and to ease resource sharing in such environment, there is a need for replication services.This research proposes a replication algorithm, termed as Relationship based Replication (RBR) that integrates users, grid and system perspective.In particular, the RBR includes information of three different relationships in identifying file(s) that requires replication; file-to-user, file-to-file and file-to-grid. …”
Get full text
Get full text
Monograph -
2
Enhanced Storage Mechanism for Secured Parallel Network File System
Published 2018“…The prime focus is on file locking techniques, state maintenance of file locks and layouts, data compression and data protection across network attached storage and parallel network file system. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Improved rsync algorithm to minimize communication cost using multi-agent systems for synchronization in multi-learning management systems
Published 2017“…Remote file synchronization (RFS) is based on updating the outdated version of a file that resides on one machine to be similar to the new version of the updated file in another machine at a minimum computation time (cost). …”
Get full text
Get full text
Get full text
Thesis -
4
Classification of JPEG files by using extreme learning machine
Published 2018“…The algorithm automatically classifies the files based on evaluation measures of three methods Entropy, Byte Frequency Distribution and Rate of Change. …”
Get full text
Get full text
Article -
5
Development of the Multipurpose Integrated Multimedia Presentation System Based on the CCM Algorithm
Published 2010“…Nevertheless commonly people use a different application for presenting those each multimedia element files type. This paper describes a multipurpose integrated multimedia presentation system (IMPS) based on channel controller model (CCM) algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
6
A log file analysis technique using binary-based approach
Published 2014“…Log files are an important by product of any computing systems including database systems. …”
Get full text
Get full text
Article -
7
Extreme learning machine classification of file clusters for evaluating content-based feature vectors
Published 2018“…In the digital forensic investigation and missing data files retrieval in general, there is a challenge of recovering files that have missing system information. …”
Get full text
Article -
8
Concealment of files blocked by Gmail with EOF-based image steganography
Published 2018“…Based on the tests performed, the application can insert Gmail-blocked file system to the image cover file, without changing the physical bit of the image cover file or file system that inserted with 100% success rate. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
File integrity monitor scheduling based on file security level classification
Published 2011“…Files are divided based on their security level group and integrity monitoring schedule is defined based on related groups. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Dynamic replication algorithm in data grid: Survey
Published 2008“…It is not enough to provide convenient accessibility to these data by only high speed network and large mainframe systems. For improving the performance of file accesses and to ease the sharing amongst distributed collaboration, such a system needs replication services. …”
Get full text
Get full text
Get full text
Book Section -
11
The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment
Published 2004“…ClipSecure is rate to be the best fitted features of cryptography system in this project scope for it has choices of nine algorithms, plus a hardcore mode and support for both message and file encryption.…”
Get full text
Get full text
Get full text
Thesis -
12
Statistical fixed range multiple selection algorithm for peer-to-peer system
Published 2010Get full text
Get full text
Conference or Workshop Item -
13
Static range multiple selection algorithm for peer-to-peer system
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item -
14
-
15
Anomaly detection in system log files using machine learning algorithms / Zahedeh Zamanian
Published 2019“…Also, log files are heterogenous and cannot fed them directly in machine learning algorithms. …”
Get full text
Get full text
Get full text
Thesis -
16
Stray animal complaint system using geolocation technique with rule-based Algorithm / Albin Lemuel Kushan … [et al.]
Published 2021“…Subsequently, local council are also keen to veer towards this adaptation by introducing more technologically based type of services such as parking system using mobile application. …”
Get full text
Get full text
Get full text
Book Section -
17
Data depublication using : Hashing algorithm / Naimah Nayan
Published 2019“…There were two type of dataset which is video and document files with four different sizes. The time taken of the hashing algorithm generate the hash value were recorded. …”
Get full text
Get full text
Thesis -
18
Replica Creation Algorithm for Data Grids
Published 2012“…Current algorithms focus on number of accesses in deciding which file to replicate and where to place them, which ignores resources’ capabilities. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Secure mobile AES encryptor (SMAE)
Published 2016“…This application will focus more on the user of the Android operating systems based mobile phone users. Besides that, the application is developed as a web based application to ensure the application can be accessed using both mobile application as well as web browser. …”
Get full text
Get full text
Undergraduates Project Papers -
20
Secure lightweight client for cloud-based E-Health Model
Published 2023“…The solution to this bottleneck is proposing a novel model for realizing a secure eHealth system. In this study, a secure cloud-based electronic health system model (SCBEH) is proposed. …”
Get full text
Get full text
Get full text
Thesis
