Search Results - (( java implementation modified algorithm ) OR ( using server clustering algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- using server »
-
1
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
2
A technique of dispatching algorithms for web-server cluster
Published 2011Get full text
Working Paper -
3
Web cluster load balancing via genetic-fuzzy based algorithm
Published 2007“…In this genetic-fuzzy based Generalized Dimension Exchange (GDE) method is proposed to uniformly distribute the unprecedented Web cluster workload. Fuzzy set theory is used to capture the vagueness of the workload during redistribution period. …”
Get full text
Get full text
Get full text
Article -
4
Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Efficient Clustering Method
Published 2010“…We introduce a modified cluster based model by using special nodes called server nodes (SN) that is powerful in term of resources. …”
Get full text
Get full text
Citation Index Journal -
5
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
6
Thermal-aware scheduling in green data centers / Muhammad Tayyab Chaudhry
Published 2015“…A thermal-aware server relocation algorithm (ThSRA) for thermal-stress free arrangement of servers is also proposed. …”
Get full text
Get full text
Thesis -
7
Enhancement load balancing in failover web server by using HTTP-response status techniques with pfsense opensource / Muhammad Hafiz Ramli
Published 2020“…There are few load balancing algorithms available that help load balance works efficiently across multiple servers. …”
Get full text
Get full text
Thesis -
8
Big Data Mining Using K-Means and DBSCAN Clustering Techniques
Published 2022“…The density-based spatial clustering of applications with noise (DBSCAN) and the K-means algorithm were used to develop clustering algorithms. …”
Get full text
Get full text
Article -
9
A modified π rough k-means algorithm for web page recommendation system
Published 2018“…Hence, this study carried out several objectives to augment the support of modified clustering algorithm. Firstly, an extended K-Means clustering algorithm (called X-Means algorithm) is proposed to filter/remove the noise from user session data to eliminate outliers or irrelevant pages. …”
Get full text
Get full text
Get full text
Thesis -
10
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
11
Using ideal time horizon for energy cost determination
Published 2021Get full text
Get full text
Get full text
Article -
12
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
13
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
14
VANET–LTE based heterogeneous vehicular clustering for driving assistance and route planning applications
Published 2018“…To address these issues, we propose a novel destination- and interest-aware clustering (DIAC) mechanism. DIAC primarily incorporates a strategic game-theoretic algorithm and a self-location calculation algorithm. …”
Get full text
Get full text
Article -
15
Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks
Published 2023“…The current security model in IoT networks uses centralized key exchange servers that present a security weak point. …”
Get full text
Get full text
Article -
16
Hybrid intelligent approach for network intrusion detection
Published 2015“…Feature selection has decreased the features from 41 to 21 features for intrusion detection and later normalization method is employed to perform and reduce the differences among the data. Clustering is the last step of processing before classification has been performed, using k-means algorithm. …”
Get full text
Get full text
Get full text
Thesis -
17
Performance analysis of Message Passing Interface collective communication on intel xeon quad-core gigabit ethernet and infiniband clusters
Published 2013“…The analysis indicates that the algorithm used for collective communication performed very well for all message sizes except for MPI-Bcast and MPI-Alltoall operation of inter-node communication. …”
Get full text
Get full text
Get full text
Article -
18
Cooperative heterogeneous vehicular clustering for road traffic management / Iftikhar Ahmad
Published 2019“…This situation results in redundancy in acquired TIS information and poor LTE spectrum utilization. Vehicular clustering is a solution to minimize the use of LTE and the added cost. …”
Get full text
Get full text
Get full text
Thesis -
19
Using Markov Model and Association Rules for Web Access Prediction
Published 2006“…This algorithm has been used to cluster similar transition behaviors for efficient used to further improve the efficiency of prediction. …”
Get full text
Get full text
Conference or Workshop Item -
20
