Search Results - (( java implication based algorithm ) OR ( data replication strategy algorithm ))
Search alternatives:
- replication strategy »
- strategy algorithm »
- implication based »
- java implication »
-
1
Vigorous replication strategy with balanced quorum for minimizing the storage consumption and response time in cloud environments
Published 2021“…Essentially, cloud replication must be able to secure huge data by enabling comprehensive replication strategies, optimal data availability, fast data retrieval, and cost-effective data management and maintenance. …”
Get full text
Get full text
Article -
2
Replica Creation Algorithm for Data Grids
Published 2012“…This thesis presents a new replication algorithm that improves data access performance in data grids by distributing relevant data copies around the grid. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Dynamic replica replacement strategy in data grid
Published 2012“…Data replication strategy is widely adopted for large scale data-intensive applications in distributed network such as data grid. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Enhanced replication strategy with balanced quorum technique and data center selection method in cloud environment
Published 2022“…In order to mitigate the issues, ‘cloud data replication’ is commonly implemented for better data performance and promising business continuity. …”
Get full text
Get full text
Thesis -
5
A bibliometric analysis: AI-driven data placement optimization in cloud replication environments
Published 2024“…Several studies have examined this area, aiming to enhance data replication techniques by integrating AI algorithms. …”
Get full text
Get full text
Get full text
Article -
6
Binary vote assignment on grid quorum replication technique with association rule
Published 2018“…Without proper strategies, replication increases job execution time. …”
Get full text
Get full text
Thesis -
7
Re-engineering grid-based quorum replication into binary vote assignment on cloud: A scalable approach for strong consistency in cloud databases
Published 2025“…The study establishes BVAC as an advancement in distributed data management and a foundation for future adaptive and multi-cloud replication frameworks.…”
Get full text
Get full text
Get full text
Article -
8
Managing Fragmented Database Replication for Mygrants Using Binary Vote Assignment on Cloud Quorum
Published 2014“…The result shows that managing replication and transaction through proposed BVACQ able to preserve data consistency. …”
Get full text
Get full text
Get full text
Article -
9
A cluster-based hybrid replica control protocol for high availability in data grid
Published 2019“…In Data Grid, data replication is a widely used technique for managing data, where exact copies of data or replicas are created and stored at many distributed sites. …”
Get full text
Get full text
Thesis -
10
-
11
A Novel Path Prediction Strategy for Tracking Intelligent Travelers
Published 2009“…The FCM nodes are a novel selection of kinematical factors. Genetic algorithm (GA) is then used to train the FCM to be able to replicate the decisional behaviors of the intelligent traveler. …”
Get full text
Get full text
Thesis -
12
A Novel Wrapper-Based Optimization Algorithm for the Feature Selection and Classification
Published 2023“…Thus, this study has proposed a novel wrapper-based Sand Cat SwarmOptimization (SCSO) technique as an FS approach to find optimum features from ten benchmark medical datasets. The SCSO algorithm replicates the hunting and searching strategies of the sand cat while having the advantage of avoiding local optima and finding the ideal solution with minimal control variables. …”
Get full text
Get full text
Article -
13
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
14
Enhancing secure QR code steganography through artificial intelligence: a conceptual framework
Published 2025“…This study presents a method for achieving product authentication through data concealing. The strategy involves using user data to generate a QR (Quick Response) code, which is then embedded into the product logo picture. …”
Get full text
Get full text
Get full text
Article -
15
-
16
Enhancing teaching and learning through data-driven optimization of servicing code demand and lecturer allocation using WEKA analysis
Published 2025“…Practically, it offers a replicable analytical framework for institutions seeking to forecast servicing code demand and align lecturer allocation strategies with real time dynamics and cost optimization goals.…”
Get full text
Get full text
Get full text
Article
