Search Results - (( data replication during algorithm ) OR ( code classification using algorithm ))
Search alternatives:
- classification using »
- code classification »
- replication during »
- during algorithm »
- using algorithm »
-
1
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
Published 2014“…In this method, features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. …”
Get full text
Get full text
Get full text
Proceeding Paper -
2
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…However, supervised learning technique has limitations for malware classification task. This paper presents a classification approach on android malware using candidate detectors generated from an unsupervised association rule of Apriori Algorithm. …”
Get full text
Get full text
Get full text
Article -
3
A novel deadlock detection algorithm for neighbour replication on grid environment
Published 2012“…A new framework and algorithm called Neighbour Replication on Grid Deadlock Detection (NRGDD) has been developed to handle deadlock cycles that exist during the transaction in Neighbour Replication on Grid (NRG) environment. …”
Get full text
Get full text
Thesis -
4
Fault Tolerence on Binary Vote Assignment Cloud Quorum (BVACQ) Replication Technique
Published 2013“…In this paper, we will manage availability of data replication during failure cases in Cloud using a new proposed algorithm called Binary Vote Assignment on Cloud Quorum (BVACQ). …”
Get full text
Get full text
Conference or Workshop Item -
5
Fault Tolerance On Binary Vote Assignment Cloud Quorum (BVACQ) Replication Technique
Published 2013“…In this paper, we will manage availability of data replication during failure cases in Cloud using a new proposed algorithm called Binary Vote Assignment on Cloud Quorum (BVACQ). …”
Get full text
Get full text
Conference or Workshop Item -
6
Network Traffic Classification Analysis on Differentiated Services Code Point Using Deep Learning Models for Efficient Deep Packet Inspection
Published 2024“…This study develops and analyze using neural network-based models for effective classification of data packets using the DSCP header field. …”
Get full text
Get full text
Get full text
Article -
7
Dynamic replication aware load blanced scheduling in distributed environment / Said Bakhshad
Published 2018“…The grid processing is a viable computing surrounding. Data replication is viewed as a vital boost mechanism in data grids. …”
Get full text
Get full text
Get full text
Thesis -
8
Replica Creation Algorithm for Data Grids
Published 2012“…This thesis presents a new replication algorithm that improves data access performance in data grids by distributing relevant data copies around the grid. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Source code classification using latent semantic indexing with structural and frequency term weighting
Published 2012“…Furthermore,it is also learned that the use of structural information in the weighting scheme contribute to a better classification.…”
Get full text
Get full text
Get full text
Article -
10
-
11
Chain coding and pre processing stages of handwritten character image file
Published 2010“…This paper discusses in detail some of the algorithms used in the pre-processing stages of an offline handwritten character image file. …”
Get full text
Get full text
Get full text
Article -
12
Development of read-one-write-all synchronization transaction daemon (row A-STD) in distributed system
Published 2010“…In distributed system environment, replicated data is the current trend to keep data updated in multiple sites. …”
Get full text
Get full text
Research Report -
13
-
14
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The motivation of implementation is to make sure the data replication is easy to maintain and cost effective. …”
Get full text
Get full text
Thesis -
15
Enhanced replication strategy with balanced quorum technique and data center selection method in cloud environment
Published 2022“…Besides, there are also issues that arise during data placement techniques consuming extensive space and high replication time due to replica copies located in every storage node in the same cluster environment to achieve high data availability. …”
Get full text
Get full text
Thesis -
16
Content adaptive fast motion estimation based on spatio-temporal homogeneity analysis and motion classification
Published 2012“…This is the basis of the proposed algorithm. The proposed algorithm involves a multistage approach that includes motion vector prediction and motion classification using the characteristics of video sequences. …”
Get full text
Get full text
Get full text
Article -
17
Scene classification for aerial images based on CNN using sparse coding technique
Published 2023Article -
18
Crow Search Freeman Chain Code (CS-FCC) feature extraction algorithm for handwritten character recognition
Published 2023“…The algorithm experiments are carried out using the chain code representation created from previous research of the Centre of Excellence for Document Analysis and Recognition (CEDAR) dataset, which consists of 126 upper-case letter characters. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Binary vote assignment on grid quorum replication technique with association rule
Published 2018“…However, these techniques have its weaknesses in terms of communication costs that is the total replication servers needed to replicate the data. Furthermore, these techniques also do not consider the correlation between data during the fragmentation process. …”
Get full text
Get full text
Thesis -
20
Maldroid- attribute selection analysis for malware classification
Published 2019“…Hence, the objective of this paper is to find the most effective and efficient attribute selection and classification algorithm in malware detection. Moreover, in order to get the best combination between attribute selection and classification algorithm, eight attributes selection and seven categories machine learning algorithm are applied in this study. …”
Get full text
Get full text
Get full text
Article
