Search Results - (( java implication based algorithm ) OR ( data replication strategy algorithm ))

  • Showing 1 - 16 results of 16
Refine Results
  1. 1

    Vigorous replication strategy with balanced quorum for minimizing the storage consumption and response time in cloud environments by Mohd Ali, Fazlina, Latip, Rohaya, Alrshah, Mohamed A., Abdullah, Azizol, Ibrahim, Hamidah

    Published 2021
    “…Essentially, cloud replication must be able to secure huge data by enabling comprehensive replication strategies, optimal data availability, fast data retrieval, and cost-effective data management and maintenance. …”
    Get full text
    Get full text
    Article
  2. 2

    Replica Creation Algorithm for Data Grids by Madi, Mohammed Kamel

    Published 2012
    “…This thesis presents a new replication algorithm that improves data access performance in data grids by distributing relevant data copies around the grid. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Dynamic replica replacement strategy in data grid by Soosai, Alexis M., Abdullah, Azizol, Othman, Mohamed, Latip, Rohaya, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2012
    “…Data replication strategy is widely adopted for large scale data-intensive applications in distributed network such as data grid. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Enhanced replication strategy with balanced quorum technique and data center selection method in cloud environment by Mohd Ali, Fazlina

    Published 2022
    “…In order to mitigate the issues, ‘cloud data replication’ is commonly implemented for better data performance and promising business continuity. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Binary vote assignment on grid quorum replication technique with association rule by Ainul Azila, Che Fauzi

    Published 2018
    “…Without proper strategies, replication increases job execution time. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Managing Fragmented Database Replication for Mygrants Using Binary Vote Assignment on Cloud Quorum by Noraziah, Ahmad, Ainul Azila, Che Fauzi, Wan Maseri, Wan Mohd, Mohd Azhar, Mohd Amer, Herawan, Tutut

    Published 2014
    “…The result shows that managing replication and transaction through proposed BVACQ able to preserve data consistency. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    A cluster-based hybrid replica control protocol for high availability in data grid by Mabni, Zulaile

    Published 2019
    “…In Data Grid, data replication is a widely used technique for managing data, where exact copies of data or replicas are created and stored at many distributed sites. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    A Novel Path Prediction Strategy for Tracking Intelligent Travelers by Motlagh, Omid Reza Esmaeili

    Published 2009
    “…The FCM nodes are a novel selection of kinematical factors. Genetic algorithm (GA) is then used to train the FCM to be able to replicate the decisional behaviors of the intelligent traveler. …”
    Get full text
    Get full text
    Thesis
  12. 12

    A Novel Wrapper-Based Optimization Algorithm for the Feature Selection and Classification by Talpur, N., Abdulkadir, S.J., Hasan, M.H., Alhussian, H., Alwadain, A.

    Published 2023
    “…Thus, this study has proposed a novel wrapper-based Sand Cat SwarmOptimization (SCSO) technique as an FS approach to find optimum features from ten benchmark medical datasets. The SCSO algorithm replicates the hunting and searching strategies of the sand cat while having the advantage of avoiding local optima and finding the ideal solution with minimal control variables. …”
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Enhancing secure QR code steganography through artificial intelligence: a conceptual framework by Roslan, Nuur Alifah, Lydia, Maya Silvi, Gutub, Adnan

    Published 2025
    “…This study presents a method for achieving product authentication through data concealing. The strategy involves using user data to generate a QR (Quick Response) code, which is then embedded into the product logo picture. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Enhancing teaching and learning through data-driven optimization of servicing code demand and lecturer allocation using WEKA analysis by Rochin Demong, Nur Atiqah, Mohamed Razali, Murni Zarina, Kamaruddin, Juliana Noor, Shamsuddin, Sazwan, Awang, Nor Ain, Kamarudin, Norjuliatie, Wan Othman, Noor Faradilla

    Published 2025
    “…Practically, it offers a replicable analytical framework for institutions seeking to forecast servicing code demand and align lecturer allocation strategies with real time dynamics and cost optimization goals.…”
    Get full text
    Get full text
    Get full text
    Article