Search Results - (( java data replication algorithm ) OR ( risk communication using algorithm ))
Search alternatives:
- replication algorithm »
- communication using »
- risk communication »
- using algorithm »
- java »
-
1
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The motivation of implementation is to make sure the data replication is easy to maintain and cost effective. …”
Get full text
Get full text
Thesis -
2
A cluster-based hybrid replica control protocol for high availability in data grid
Published 2019“…In Data Grid, data replication is a widely used technique for managing data, where exact copies of data or replicas are created and stored at many distributed sites. …”
Get full text
Get full text
Thesis -
3
-
4
CONTEXT AWARE TRAFFIC SCHEDULING ALGORITHM FOR COMMUNICATION SYSTEM IN POWER DISTRIBUTION NETWORK
Published 2023“…The designated algorithm is tested with Multi-Protocol Label Switching (MPLS) protocol using Network Simulator 3 (NS-3) as a simulation platform. …”
text::Thesis -
5
The significant effect of feature selection methods in spam risk assessment using dendritic cell algorithm
Published 2024conference output::conference proceedings::conference paper -
6
The Significant Effect of Feature Selection Methods in Spam Risk Assessment Using Dendritic Cell Algorithm
Published 2024Proceedings Paper -
7
-
8
Diagnosing Metabolic Syndrome Using Genetically Optimised Bayesian ARTMAP
Published 2019“…We use the GOBAM algorithm to classify individuals as either being at risk of MetS or not at risk of MetS with a related posterior probability, which ranges between 0 and 1. …”
Get full text
Get full text
Article -
9
-
10
Computational intelligence approach for classification and risk quantification of metabolic syndrome / Habeebah Adamu Kakudi
Published 2019“…Genetic Algorithm(GA) is used to optimize the order of sequence of the input sample and the parameters of the Bayesian ARTMAP (BAM). …”
Get full text
Get full text
Get full text
Thesis -
11
-
12
Unified framework for spam detection and risk assessment in short message communication media / Adewole Kayode Sakariyah
Published 2018“…Four levels of risk were employed with their corresponding response strategies used to map risk levels into different types of response. …”
Get full text
Get full text
Get full text
Thesis -
13
Rogue access point detection and tracking system using trilateration algorithm
Published 2023Get full text
Get full text
Book Section -
14
Text spam messages classification using Artificial Immune System (AIS) algorithms
Published 2024thesis::master thesis -
15
Selection of prospective workers using profile matching algorithm on crowdsourcing platform
Published 2022Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
ChoCD : Usable and secure graphical password authentication scheme
Published 2024thesis::master thesis -
17
Whale optimization algorithm strategies for higher interaction strength t-way testing
Published 2022“…Combinatorial testing (CT) can be used in this case to reduce risks and ensure conformance to specifications. …”
Get full text
Get full text
Get full text
Article -
18
-
19
Digital Framing and Reputation Crisis: A TikTok Framing Analysis of the Yai Mim–Sahara Case in the Context of Communication
Published 2026journal-article -
20
