Search Results - (( data replication method algorithm ) OR ( parameter estimation packet algorithm ))
Search alternatives:
- replication method »
- method algorithm »
- packet algorithm »
- parameter »
-
1
Dynamic replication algorithm in data grid: Survey
Published 2008“…For improving the performance of file accesses and to ease the sharing amongst distributed collaboration, such a system needs replication services. Data replication is a common method used to improve the performance of data access in distributed systems. …”
Get full text
Get full text
Get full text
Book Section -
2
Q-learning based vertical handover decision algorithm in LTE-A two-tier macrocell-femtocell systems / Ammar Bathich
Published 2019“…The proposed algorithms reduced the handover number, packet delay and packet loss by 48%, 89% and 85% respectively, whereas the system throughput increased by 13% compared to reference algorithms.…”
Get full text
Get full text
Thesis -
3
Relay suitability based routing protocol for video streaming in vehicular ad-hoc network
Published 2022“…This thesis proposed a solution technique referred to as an Enhanced Transmit Packet Coding (enhanced-TPC) and weighted division algorithm (WDA) in Relay suitability-based routing protocol (RESP) term as WDA-RESP. …”
Get full text
Get full text
Thesis -
4
Performance Enhancement of Routing Protocols in Mobile Wireless Ad-Hoc Networks Using Fuzzy Reasoning Algorithm
Published 2006“…Finally, in the last method fuzzy reasoning is used for network congestion estimation and estimating time to start dropping incoming packets. …”
Get full text
Get full text
Thesis -
5
Enhanced replication strategy with balanced quorum technique and data center selection method in cloud environment
Published 2022“…In order to mitigate the issues, ‘cloud data replication’ is commonly implemented for better data performance and promising business continuity. …”
Get full text
Get full text
Thesis -
6
RECURSIVE LEARNING ALGORITHMS ON RBF NETWORKS FOR NONLINEAR SYSTEM IDENTIFICATION
Published 2010“…The proposed methods are tested using well known nonlinear benchmark problems and also evaluated for system with irregular sample time or known as lost packets. The finite difference based gradient estimate, proposed in this thesis, provides a viable solution only for identifying a system with irregular sample time.…”
Get full text
Get full text
Get full text
Thesis -
7
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The motivation of implementation is to make sure the data replication is easy to maintain and cost effective. …”
Get full text
Get full text
Thesis -
8
Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar
Published 2017“…In addition, the structural parameters of a system can be accurately estimated through the proposed system identification methods for both cases of linear and nonlinear conditions. …”
Get full text
Get full text
Get full text
Thesis -
9
Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution / Nor Azura Ayop
Published 2016“…The objective of this research is to characterize inbound internet traffic collected on real live IP-based campus network, to develop Adaptive Policing and Shaping Algorithms with percentage level on Inbound Traffic based on traffic characterization and to compare the policing and shaping performance on bandwidth used, processing time and packet loss. …”
Get full text
Get full text
Thesis -
10
-
11
-
12
A Novel Wrapper-Based Optimization Algorithm for the Feature Selection and Classification
Published 2023“…To address this issue, various data pre-processing methods called Feature Selection (FS) techniques have been presented in the literature. …”
Get full text
Get full text
Article -
13
EZ-SEP: extended Z-SEP routing protocol with hierarchical clustering approach for wireless heterogeneous sensor network
Published 2021“…In addition, EZ-SEP is weighted up using various estimation schemes such as base station repositioning, altering the field density, and variable nodes energy for comparison with the previous parent algorithm. …”
Get full text
Get full text
Get full text
Article -
14
Rockfall source identification using a hybrid Gaussian mixture-ensemble machine learning model and LiDAR data
Published 2019“…In addition, this technique has achieved excellent accuracies (ROC = 95%) over other methods used. Moreover, the proposed model has achieved the optimal prediction accuracies (92%) on the basis of testing data, thereby indicating that the model can be generalised and replicated in different regions, and the proposed method can be applied to various landslide studies.…”
Get full text
Get full text
Get full text
Article -
15
Skype multimedia application traffic analysis on home Unifi network / Siti Fatimah Ramle
Published 2017“…Maximum Likelihood Estimator (MLE) technique is used to get the best traffic model which presents the highest MLE value. …”
Get full text
Get full text
Thesis -
16
Enhancing clustering algorithm with initial centroids in tool wear region recognition
Published 2020“…K-means clustering has become the most applied algorithm in discovering classes in an unsupervised scenario. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
18
A framework for automatic modelling of survival using fuzzy inference.
Published 2012“…After the initialisation of the fuzzy inference structure, the replication data (until time to event) will be subject to be trained using the gradient descent and nonnegative least square algorithm to estimate the conditional event probability. …”
Get full text
Get full text
Conference or Workshop Item -
19
A Novel Path Prediction Strategy for Tracking Intelligent Travelers
Published 2009“…The FCM nodes are a novel selection of kinematical factors. Genetic algorithm (GA) is then used to train the FCM to be able to replicate the decisional behaviors of the intelligent traveler. …”
Get full text
Get full text
Thesis -
20
Access control model based on trust, purpose, and role in materialized view for privacy protection
Published 2019“…This study focuses on data privacy protection in materialized view. Materialized view is a replica of a table which is created in a very large system where data are replicated from the master tables. …”
Get full text
Get full text
Thesis
