Search Results - (( data replication from algorithm ) OR ( parameter detection method algorithm ))
Search alternatives:
- parameter detection »
- replication from »
- method algorithm »
- from algorithm »
-
1
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
2
Binary Vote Assignment on Cloud Quorum Algorithm for Fragmented MyGRANTS Database Replication
Published 2015“…Data replication is one of the mechanisms to manage data since it improves data accessibility and reliability. …”
Get full text
Get full text
Get full text
Article -
3
A novel deadlock detection algorithm for neighbour replication on grid environment
Published 2012“…The use of three to five transactions is in NRG the data will be replicated into three to five sites. …”
Get full text
Get full text
Thesis -
4
BVAGQ-AR for Fragmented Database Replication Management
Published 2021“…The result from the experiment shows that handling fragmented database synchronous replication through proposed BVAGQ-AR algorithm able to preserve data consistency in distributed environment.…”
Get full text
Get full text
Get full text
Article -
5
Parameter estimation and outlier detection in linear functional relationship model / Adilah Abdul Ghapor
Published 2017“…The simulation results indicate that the proposed method is suitable to detect a single outlier. As for the multiple outliers, a clustering algorithm is considered and a dendogram to visualise the clustering algorithm is used. …”
Get full text
Get full text
Get full text
Thesis -
6
Dynamic replication aware load blanced scheduling in distributed environment / Said Bakhshad
Published 2018“…Several algorithms have been proposed and studied for scheduling and data replication, however a little research has been done so far on capturing and minimizing the migration rate of data from an existing available replica site to a next site on the basis of data scheduling in order to minimize the transfers and deletion rate. …”
Get full text
Get full text
Get full text
Thesis -
7
Application of weighted average on modal parameters for damage detection algorithms: Case study on steel beam
Published 2011“…This study verifies the use of the proposed weighting method by Fayyadh and Abdul Razak (2011a) for damage detection algorithms applied on cracked steel beam. …”
Get full text
Get full text
Get full text
Article -
8
Weighting method for modal parameter based damage detection algorithms
Published 2011Get full text
Get full text
Article -
9
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…The proposed method combined the improved teaching-learning-based optimisation (ITLBO) algorithm, improved parallel JAYA (IPJAYA) algorithm, and support vector machine. …”
Get full text
Get full text
Get full text
Article -
10
A novel binary vote assignment grid quorum algorithm for distributed database fragmentation
Published 2011“…Data replication is one of the mechanisms in data grid architecture since it improves data access and reliability. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
Get full text
Get full text
Thesis -
12
Feature Selection and Classifier Parameter Estimation for Egg Signal Peak Detection using Gravitational Search Algorithm
Published 2014“…This study focuses on using GSA method, a new computational intelligence algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
14
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…The NTLBO was proposed in this paper as an FSS mechanism; its algorithm-specific, parameter-less concept (which requires no parameter tuning during an optimization) was explored. …”
Get full text
Get full text
Get full text
Article -
15
Outlier detection in circular regression model using minimum spanning tree method
Published 2019“…The existence of outliers in a circular regression model can lead to many errors, for example in inferences and parameter estimations. Therefore, this study aims to develop new algorithms that can detect outliers by using the minimum spanning tree method. …”
Get full text
Get full text
Conference or Workshop Item -
16
Comparison of UAV flying height parameter for crack detection applications / Wan Nurdayini Batrisyia Wan Ghazali
Published 2024“…The key concern of this thesis is to determine the influence of flying height parameters on crack detection using UAVs. Looking at the current scenario of development and the age of the structures in urban areas, there is a high significance of efficient and accurate building inspection methods. …”
Get full text
Get full text
Student Project -
17
Binary vote assignment on grid quorum replication technique with association rule
Published 2018“…First step is mining the data by using Apriori algorithm from Association Rules. …”
Get full text
Get full text
Thesis -
18
Improving response time, availability and reliability through asynchronous replication technique in cluster architecture of web server cluster
Published 2010“…This paper proposes an algorithm of data replication scheme based on asynchronous replication in order to improve web server cluster system reliability. …”
Get full text
Get full text
Conference or Workshop Item -
19
Fault Tolerence on Binary Vote Assignment Cloud Quorum (BVACQ) Replication Technique
Published 2013“…It also increases the degrees of data availability. This is because the missing data from during the server failure has been reconciled and replicated after that server recovered.…”
Get full text
Get full text
Conference or Workshop Item -
20
Efficient access of replicated data in distributed database systems
Published 2001“…Replication is a useful technique for distributed database systems where a data object will be accessed (Le., read and written) from multiple locations such as from a local area network environment or geographically distributed world wide. …”
Get full text
Get full text
Thesis
