Search Results - (( data replication methods algorithm ) OR ( parallel evaluation means algorithm ))
Search alternatives:
- replication methods »
- methods algorithm »
- evaluation means »
- means algorithm »
-
1
Dynamic replication algorithm in data grid: Survey
Published 2008“…For improving the performance of file accesses and to ease the sharing amongst distributed collaboration, such a system needs replication services. Data replication is a common method used to improve the performance of data access in distributed systems. …”
Get full text
Get full text
Get full text
Book Section -
2
Enhanced replication strategy with balanced quorum technique and data center selection method in cloud environment
Published 2022“…In order to mitigate the issues, ‘cloud data replication’ is commonly implemented for better data performance and promising business continuity. …”
Get full text
Get full text
Thesis -
3
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The motivation of implementation is to make sure the data replication is easy to maintain and cost effective. …”
Get full text
Get full text
Thesis -
4
Online system identification development based on recursive weighted least square neural networks of nonlinear hammerstein and wiener models.
Published 2022“…The goodness of fit validation based on the normalized root-mean-square error (NRMSE) and normalized mean square error, and Theil’s inequality coefficient are used to evaluate the performance of models. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer
Published 2023“…The proposed algorithms were evaluated to test their speed in handling streaming data. …”
Get full text
Get full text
Thesis -
6
-
7
-
8
A Novel Wrapper-Based Optimization Algorithm for the Feature Selection and Classification
Published 2023“…To address this issue, various data pre-processing methods called Feature Selection (FS) techniques have been presented in the literature. …”
Get full text
Get full text
Article -
9
Rockfall source identification using a hybrid Gaussian mixture-ensemble machine learning model and LiDAR data
Published 2019“…In addition, this technique has achieved excellent accuracies (ROC = 95%) over other methods used. Moreover, the proposed model has achieved the optimal prediction accuracies (92%) on the basis of testing data, thereby indicating that the model can be generalised and replicated in different regions, and the proposed method can be applied to various landslide studies.…”
Get full text
Get full text
Get full text
Article -
10
Extreme Learning Machines: A new approach for prediction of reference evapotranspiration
Published 2023Article -
11
Enhancing clustering algorithm with initial centroids in tool wear region recognition
Published 2020“…K-means clustering has become the most applied algorithm in discovering classes in an unsupervised scenario. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Improved criteria determination of an automated negative lightning return strokes characterisation using Brute-Force search algorithm
Published 2021“…A total of 206 negative lightning return strokes waveforms were analysed and automatically characterised using the proposed algorithm. Comparisons of different data, including the manual data (i.e. obtained through the conventional method), data (automated) from a previous study, and the automated data (i.e. obtained using the proposed algorithm), were also carried out by evaluating the percentage difference, arithmetic mean, and standard deviation. …”
Get full text
Get full text
Thesis -
13
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
14
A framework for automatic modelling of survival using fuzzy inference.
Published 2012“…After the initialisation of the fuzzy inference structure, the replication data (until time to event) will be subject to be trained using the gradient descent and nonnegative least square algorithm to estimate the conditional event probability. …”
Get full text
Get full text
Conference or Workshop Item -
15
Robust tweets classification using arithmetic optimization with deep learning for sustainable urban living
Published 2024“…For sentiment detection, the AOADL-TC technique applies a parallel bidirectional gated recurrent unit (BiGRU) model. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Authenticating sensitive diacritical texts using residual, data representation and pattern matching methods / Saqib Iqbal Hakak
Published 2018“…The searching of halves is achieved through two different algorithms based on the split approach and the parallel approach respectively. …”
Get full text
Get full text
Get full text
Thesis -
17
A Novel Path Prediction Strategy for Tracking Intelligent Travelers
Published 2009“…The FCM nodes are a novel selection of kinematical factors. Genetic algorithm (GA) is then used to train the FCM to be able to replicate the decisional behaviors of the intelligent traveler. …”
Get full text
Get full text
Thesis -
18
Access control model based on trust, purpose, and role in materialized view for privacy protection
Published 2019“…This study focuses on data privacy protection in materialized view. Materialized view is a replica of a table which is created in a very large system where data are replicated from the master tables. …”
Get full text
Get full text
Thesis -
19
HARC-New Hybrid Method with Hierarchical Attention Based Bidirectional Recurrent Neural Network with Dilated Convolutional Neural Network to Recognize Multilabel Emotions from Text
Published 2021“…The accuracy of the proposed HARC method was 82.50 percent IMDB, 98.00 percent for toxic data, 92.31 percent for Cornflower, and 94.60 percent for Emotion recognition data. …”
Get full text
Get full text
Get full text
Article -
20
Enhancing secure QR code steganography through artificial intelligence: a conceptual framework
Published 2025“…This study presents a method for achieving product authentication through data concealing. …”
Get full text
Get full text
Get full text
Article
