Search Results - (( java implementation modified algorithm ) OR ( using server clustering algorithm ))

Refine Results
  1. 1

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Web cluster load balancing via genetic-fuzzy based algorithm by Chin, Wen Cheong, Lim, Amy Hui Lan

    Published 2007
    “…In this genetic-fuzzy based Generalized Dimension Exchange (GDE) method is proposed to uniformly distribute the unprecedented Web cluster workload. Fuzzy set theory is used to capture the vagueness of the workload during redistribution period. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Efficient Clustering Method by Hasan, Nurul

    Published 2010
    “…We introduce a modified cluster based model by using special nodes called server nodes (SN) that is powerful in term of resources. …”
    Get full text
    Get full text
    Citation Index Journal
  5. 5

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Thermal-aware scheduling in green data centers / Muhammad Tayyab Chaudhry by Chaudhry, Muhammad Tayyab

    Published 2015
    “…A thermal-aware server relocation algorithm (ThSRA) for thermal-stress free arrangement of servers is also proposed. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Enhancement load balancing in failover web server by using HTTP-response status techniques with pfsense opensource / Muhammad Hafiz Ramli by Ramli, Muhammad Hafiz

    Published 2020
    “…There are few load balancing algorithms available that help load balance works efficiently across multiple servers. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Big Data Mining Using K-Means and DBSCAN Clustering Techniques by Fawzia Omer, A., Mohammed, H.A., Awadallah, M.A., Khan, Z., Abrar, S.U., Shah, M.D.

    Published 2022
    “…The density-based spatial clustering of applications with noise (DBSCAN) and the K-means algorithm were used to develop clustering algorithms. …”
    Get full text
    Get full text
    Article
  9. 9

    A modified π rough k-means algorithm for web page recommendation system by Zidane, Khaled Ali Othman

    Published 2018
    “…Hence, this study carried out several objectives to augment the support of modified clustering algorithm. Firstly, an extended K-Means clustering algorithm (called X-Means algorithm) is proposed to filter/remove the noise from user session data to eliminate outliers or irrelevant pages. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  11. 11
  12. 12

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  13. 13

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    VANET–LTE based heterogeneous vehicular clustering for driving assistance and route planning applications by Ahmad, Iftikhar, Noor, Rafidah Md, Ahmedy, Ismail, Shah, Syed Adeel Ali, Yaqoob, Ibrar, Ahmed, Ejaz, Imran, Muhammad

    Published 2018
    “…To address these issues, we propose a novel destination- and interest-aware clustering (DIAC) mechanism. DIAC primarily incorporates a strategic game-theoretic algorithm and a self-location calculation algorithm. …”
    Get full text
    Get full text
    Article
  15. 15

    Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks by Al Ahmed, Mahmoud Tayseer, Hashim, Fazirulhisyam, Hashim, Shaiful Jahari, Abdullah, Azizol

    Published 2023
    “…The current security model in IoT networks uses centralized key exchange servers that present a security weak point. …”
    Get full text
    Get full text
    Article
  16. 16

    Hybrid intelligent approach for network intrusion detection by Al-Mohammed, Wael Hasan Ali

    Published 2015
    “…Feature selection has decreased the features from 41 to 21 features for intrusion detection and later normalization method is employed to perform and reduce the differences among the data. Clustering is the last step of processing before classification has been performed, using k-means algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Performance analysis of Message Passing Interface collective communication on intel xeon quad-core gigabit ethernet and infiniband clusters by Ismail, Roswan, Abdul Hamid, Nor Asilah Wati, Othman, Mohamed, Latip, Rohaya

    Published 2013
    “…The analysis indicates that the algorithm used for collective communication performed very well for all message sizes except for MPI-Bcast and MPI-Alltoall operation of inter-node communication. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Cooperative heterogeneous vehicular clustering for road traffic management / Iftikhar Ahmad by Iftikhar , Ahmad

    Published 2019
    “…This situation results in redundancy in acquired TIS information and poor LTE spectrum utilization. Vehicular clustering is a solution to minimize the use of LTE and the added cost. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Using Markov Model and Association Rules for Web Access Prediction by Siriporn, Chimphlee, Salim, Naomie, Ngadiman, Mohd. Salihin, Witcha, Chimphlee

    Published 2006
    “…This algorithm has been used to cluster similar transition behaviors for efficient used to further improve the efficiency of prediction. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20