Search Results - (( data replication mining algorithm ) OR ( java applications cloud algorithm ))
Search alternatives:
- applications cloud »
- java applications »
- mining algorithm »
- cloud algorithm »
- replication »
-
1
Binary vote assignment on grid quorum replication technique with association rule
Published 2018“…The main feature of BV AGQ-AR is that the technique integrates replication and data mining technique allowing meaningful extraction of knowledge from large data sets. …”
Get full text
Get full text
Thesis -
2
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…After that we use to build securing cloud data system (SCDS) for key exposure using the AES algorithm for encrypting and decrypting our website cloud data and files. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
4
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…The approach of the mobile cloud is clearly occurring with web host servers expands thus large number of data around the world stored in huge servers, consumers of mobile devices and small computing devices have high performance expectations usually, therefore mobile cloud computing theorizes that the cloud will soon become a disruptive force in the mobile world, eventually becoming the dominant way in which mobile applications operates. …”
Get full text
Get full text
Thesis -
5
Exploration of machine learning forecasting methods in M4 competition / Muhammad Halim Hamdan and Shuzlina Abdul-Rahman
Published 2021“…There are so many forecasting algorithms and techniques available. The abilities of Data Mining to obtain and gather data from multiple sources is very useful to researcher, practitioner, business and more. …”
Get full text
Get full text
Get full text
Article -
6
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
7
