Search Results - (( data replication methods algorithm ) OR ( risk reduction method algorithm ))

Refine Results
  1. 1

    Dynamic replication algorithm in data grid: Survey by K. Madi, Mohammed, Hassan, Suhaidi

    Published 2008
    “…For improving the performance of file accesses and to ease the sharing amongst distributed collaboration, such a system needs replication services. Data replication is a common method used to improve the performance of data access in distributed systems. …”
    Get full text
    Get full text
    Get full text
    Book Section
  2. 2

    Enhanced replication strategy with balanced quorum technique and data center selection method in cloud environment by Mohd Ali, Fazlina

    Published 2022
    “…In order to mitigate the issues, ‘cloud data replication’ is commonly implemented for better data performance and promising business continuity. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The motivation of implementation is to make sure the data replication is easy to maintain and cost effective. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6
  7. 7

    Investigation of dimensionality reduction in a finger vein verification system by Ting, Ei Wei, M. Z., Ibrahim, Mulvaney, D. J.

    Published 2018
    “…Risk can be reduced by adopting direct methods that identify the person and these are generally biometric methods, such as iris, face, voice and fingerprint recognition approaches. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching by Ei Wei., Ting, M. Z., Ibrahim, D.J., Mulvaney

    Published 2017
    “…The traditional ways that used to protect privacy such as Personal Identification Number (PIN) and smart card are getting replaced by the biometric methods due to its high risk for being forgotten and exposure. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10

    Surgical management of distal tibia fracture: towards an outcome-based treatment algorithm by Isnin, Rushdi, Che Ahmad, Aminudin, Abdul Ghani, Kamarul Haq, Mohd Rus, Razman

    Published 2020
    “…We aim to propose an algorithm for management of distal tibia fractures by evaluating the treatment options, outcomes and risk factors present. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    A Novel Wrapper-Based Optimization Algorithm for the Feature Selection and Classification by Talpur, N., Abdulkadir, S.J., Hasan, M.H., Alhussian, H., Alwadain, A.

    Published 2023
    “…To address this issue, various data pre-processing methods called Feature Selection (FS) techniques have been presented in the literature. …”
    Get full text
    Get full text
    Article
  12. 12

    Classification of SNPs for obesity analysis using FARNeM modelling by Ong, Phaik Ling, Choo, Yun Huoy, Emran, Nurul Akmar

    Published 2013
    “…The experimental results were compared against Correlation Feature Selection (CFS) method and ReliefF method. Classification accuracy, sensitivity, specificity, positive predictive value and negative predictive value were chosen to assess the performance of the comparison methods on error rate and validated by paired-sample T-test. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Rockfall source identification using a hybrid Gaussian mixture-ensemble machine learning model and LiDAR data by Fanos, Ali Mutar, Pradhan, Biswajeet, Mansor, Shattri, Md Yusoff, Zainuddin, Abdullah, Ahmad Fikri, Jung, Hyung Sup

    Published 2019
    “…In addition, this technique has achieved excellent accuracies (ROC = 95%) over other methods used. Moreover, the proposed model has achieved the optimal prediction accuracies (92%) on the basis of testing data, thereby indicating that the model can be generalised and replicated in different regions, and the proposed method can be applied to various landslide studies.…”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Hexagon pattern particle swarm optimization based block matching algorithm for motion estimation / Siti Eshah Che Osman by Che Osman, Siti Eshah

    Published 2019
    “…The final results have proved that HPSO algorithm could achieve 5% - 34% of computation cost reduction with satisfying degradation value of image quality. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Optimizing in-car-abandoned children’s sounds detection using deep learning algorithms / Nur Atiqah Izzati Md Fisol by Md Fisol, Nur Atiqah Izzati

    Published 2023
    “…By proposing an alternative method to detect in-car-abandoned children's sounds with high accuracy, this research can assist authorities, including the Ministry of Transportation, in implementing effective measures to mitigate the risks associated with this pressing issue. …”
    Get full text
    Get full text
    Student Project
  16. 16

    Radiation dose, cancer risk and diagnostic performance of computed tomography pulmonary angiography examination by Haspi Harun, Hanif

    Published 2021
    “…Hence, this study aims to evaluate the radiation dose, cancer risk and image diagnostic performance of CTPA examination regarding primary and secondary optimization such as iterative reconstruction (IR) algorithm, tube potential and pitch factor selection. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Pairwise clusters optimization and cluster most significant feature methods for anomaly-based network intrusion detection system (POC2MSF) / Gervais Hatungimana by Hatungimana, Gervais

    Published 2018
    “…Most of researches in IDS which use k-centroids-based clustering methods like K-means, K-medoids, Fuzzy, Hierarchical and agglomerative algorithms to baseline network traffic suffer from high false positive rate compared to signature-based IDS, simply because the nature of these algorithms risk to force some network traffic into wrong profiles depending on K number of clusters needed. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    An enhanced supplier selection model based on optimized analytic network process towards sustainable information technology outsourcing by Fusiripong, Prashaya

    Published 2022
    “…However, existing ITO supplier selection models lack of sustainability criteria and risk factors. Moreover, these methods rely on human judgment in weight allocation. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Structured multi-head attention stock index prediction method based adaptive public opinion sentiment vector by Zhao, Cheng, Peng, Zhe, Lan, Xuefeng, Cen, Yuefeng, Wang, Zuxin

    Published 2024
    “…Themean absolute percentage error (MAPE) of the proposedmethod is 0.463, a reduction of 0.294 compared to the benchmark attention algorithm. …”
    Get full text
    Get full text
    Article