Search Results - (( java implementation modified algorithm ) OR ( problem using replication algorithm ))
Search alternatives:
- implementation modified »
- replication algorithm »
- java implementation »
- using replication »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
A novel deadlock detection algorithm for neighbour replication on grid environment
Published 2012“…Therefore, an action must be taken to detect and solve this problem. A new framework and algorithm called Neighbour Replication on Grid Deadlock Detection (NRGDD) has been developed to handle deadlock cycles that exist during the transaction in Neighbour Replication on Grid (NRG) environment. …”
Get full text
Get full text
Thesis -
3
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
4
Managing Fragmented Database Using BVAGQ-AR Replication Model
Published 2017“…If the unreasonable data is used in database replication, it will cause waste of data storage and delay the time taken for a replication process. …”
Get full text
Get full text
Get full text
Article -
5
Managing MyGRANTS Fragmented Database Using Binary Vote Assignment Grid Quorum with Association Rule (BVAGQ-AR) Replication Model
Published 2015“…Nevertheless, if the impractical data is used in database replication, this will cause waste of data storage and the time taken for a replication process will be delayed. …”
Get full text
Get full text
Conference or Workshop Item -
6
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
7
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
8
Ancestral dynamic voting algorithm for mutual exclusion in partitioned distributed systems
Published 2013“…Data replication is a known redundancy used in fault-tolerant distributed system. …”
Get full text
Get full text
Get full text
Article -
9
Development of read-one-write-all synchronization transaction daemon (row A-STD) in distributed system
Published 2010“…A new algorithm has been designed and developed to manage replication and transaction using ROW A-MSTS prototype. …”
Get full text
Get full text
Research Report -
10
Multi-factor replica placement strategy for resource failure extenuation in cloud replication environment
Published 2025“…This study presents a novel Multi-Factor Replica Placement Strategy (MRPS) that effectively reduces the risk of resource failure in cloud replication systems. The performance of the suggested algorithm was evaluated through a comprehensive experiment using the CloudSim simulator, and its ability to choose and replicate data files for user requests was measured. …”
Get full text
Get full text
Get full text
Article -
11
Enhanced replication strategy with balanced quorum technique and data center selection method in cloud environment
Published 2022“…In order to validate the competence of these proposed algorithms, results were compared with another similar research work known as DPRS algorithm. …”
Get full text
Get full text
Thesis -
12
-
13
Routing problem in rectangular mesh network using Dijkstra’s based Greedy method
Published 2018“…Therefore, developing a shortest path based routing algorithm is in need. In this research, Dijkstra’s algorithm is used to establish the shortest connection for each net. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Application of correlation as a measure of performance
Published 2011“…Correlation generally shows the relationship between variables. A judicious use of this relationship may yield a measure of performance for a given algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
15
Managing fragmented database in distributed database environment / Ainul Azila Che Fauzi ... [et al.]
Published 2021“…We address how to build a reliable system by using a distributed database fragmentation algorithm. …”
Get full text
Get full text
Get full text
Article -
16
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
17
An Enhanced Simulated Annealing Routing Algorithm for Semi-Diagonal Torus Network
Published 2017“…Multiprocessor is another great technology that helps in advancing human civilization due to high demands for solving complex problems. A multiprocessing system can have a lot of replicated processor-memory pairs (henceforth regard as net) or also called as processing nodes. …”
Get full text
Get full text
Get full text
Article -
18
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
19
A Novel Path Prediction Strategy for Tracking Intelligent Travelers
Published 2009“…The FCM nodes are a novel selection of kinematical factors. Genetic algorithm (GA) is then used to train the FCM to be able to replicate the decisional behaviors of the intelligent traveler. …”
Get full text
Get full text
Thesis -
20
Dynamic object replica placement using underlying routing protocols: ensuring the reliability
Published 2013“…In this paper, it is discussed that reliability can be assured if we use replica placement algorithm along with the EIGRP (Enhanced Interior Gateway Routing Protocol). …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
