Search Results - (( parallel extraction method algorithm ) OR ( data distribution from algorithm ))
Search alternatives:
- parallel extraction »
- extraction method »
- data distribution »
- distribution from »
- method algorithm »
- from algorithm »
-
1
Mapreduce algorithm for weather dataset
Published 2017“…The algorithm is tested using small and big dataset. The temperature, humidity and visibility attributes from the dataset has been extracted by the MapReduce Algorithm into structure data. …”
Get full text
Get full text
Thesis -
2
MapReduce algorithm for weather dataset
Published 2018“…The algorithm is tested using small and big dataset. The temperature, humidity and visibility attributes from the dataset has been extracted by the MapReduce Algorithm into structure data. …”
Get full text
Get full text
Research Report -
3
Image classification using two dimensional wavelet coefficients with parallel computing
Published 2020“…This research algorithm demonstrated a very promising result with Support Vector Machines, this algorithm produces a 90% of accuracies whereas the decision tree algorithm gets 100% accuracies. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
Voting algorithms for large scale fault-tolerant systems
Published 2011“…To solve this problem and gain benefits of this algorithm, we employed parallel algorithm technique and by using optimal number of processors, we could propose optimal algorithms known as Parallel Average Voting and Parallel Weighted Average Voting which both have optimal time complexity and less calculation cost. …”
Get full text
Get full text
Thesis -
5
Automated plant recognition system based on multi-objective parallel genetic algorithm and neural network
Published 2014“…To conclude, multi objective parallel genetic algorithm can automatically tune feed forward neural network to classify the dataset with a good classification rate.…”
Get full text
Get full text
Thesis -
6
An efficient indexing and retrieval of iris biometrics data using hybrid transform and firefly based K-means algorithm title
Published 2019“…The enhanced method combines three transformation methods for analyzing the iris image and extracting its local features. …”
Get full text
Get full text
Thesis -
7
Robust partitioning and indexing for iris biometric database based on local features
Published 2018“…The proposed method combines three transformation methods DCT, DWT and SVD to analyse iris images and extract their local features. …”
Get full text
Get full text
Get full text
Article -
8
Combining deep and handcrafted image features for MRI brain scan classification
Published 2019“…In parallel, handcrafted features are extracted using the modified gray level co-occurrence matrix (MGLCM) method. …”
Get full text
Get full text
Get full text
Article -
9
-
10
Magnetic resonance imaging sense reconstruction system using FPGA / Muhammad Faisal Siddiqui
Published 2016“…Parallel imaging is a robust method for accelerating the data acquisition in Magnetic Resonance Imaging (MRI). …”
Get full text
Get full text
Get full text
Thesis -
11
A new multi-frames watermarking technique for tamper detection and recovery
Published 2017“…The sequential multi-frames watermarking process could be speed up by two methods, first method was designed a speedy watermarking scheme algorithm (ROI-DR) in a single frame of medical image, and the second method was developed a new multi-frames watermarking scheme by adding parallelism component into sequential multi-frames watermarking process. …”
Get full text
Get full text
Thesis -
12
Binary Vote Assignment on Cloud Quorum Algorithm for Fragmented MyGRANTS Database Replication
Published 2015“…Therefore, the storage, availability, and consistency are important issues to be addressed in order to allow distributed users efficiently and safely access data from many different sites. …”
Get full text
Get full text
Get full text
Article -
13
Estimation Of Weibull Parameters Using Simulated Annealing As Applied In Financial Data
Published 2023“…The MIRR were computed based on the data extracted from the companies’ financial reports from 2010 to 2018. …”
Get full text
Get full text
Thesis -
14
Workflow optimization in distributed computing environment for stream-based data processing model / Saima Gulzar Ahmad
Published 2017“…This thesis proposes data-intensive workflow optimization algorithms. …”
Get full text
Get full text
Get full text
Thesis -
15
A novel binary vote assignment grid quorum algorithm for distributed database fragmentation
Published 2011“…Therefore, the storage, availability, and consistency are important issues to be addressed in order to allow distributed users efficiently and safely access data from many different sites. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Network reconfiguration and control for loss reduction using genetic algorithm
Published 2010“…All the data for 18-bus system test are taken from previous work, and all the data for 49-bus system test are taken from an existing Iraqi distribution network. …”
Get full text
Get full text
Thesis -
17
Twofold Integer Programming Model for Improving Rough Set Classification Accuracy in Data Mining.
Published 2005“…The accuracy for rules and classification resulted from the TIP method are compared with other methods such as Standard Integer Programming (SIP) and Decision Related Integer Programming (DRIP) from Rough Set, Genetic Algorithm (GA), Johnson reducer, HoltelR method, Multiple Regression (MR), Neural Network (NN), Induction of Decision Tree Algorithm (ID3) and Base Learning Algorithm (C4.5); all other classifiers that are mostly used in the classification tasks. …”
Get full text
Get full text
Thesis -
18
Technical job distribution at BSD SHARP service center using combination of naïve Bayes and K-Nearest neighbour
Published 2022“…Inappropriate work distribution can increase complaints from customers. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
-
20
Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen
Published 2023“…In this paper, a comparative study is done between the two security algorithms on a cloud platform called eyeOS. From the comparative study it was found that the Rivest Shamir Adlemen (3kRSA) algorithm outperforms that triple data encryption standard (3DES) algorithm with respect to the complexity, and output bytes. …”
Article
