Search Results - (( data replication using algorithm ) OR ( java application ((new algorithm) OR (_ algorithm)) ))
Search alternatives:
- replication using »
- java application »
- using algorithm »
- new algorithm »
-
1
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The new replication process will also be used in e-commerce application to secure user transaction information. …”
Get full text
Get full text
Thesis -
2
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
3
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
-
5
Text steganalysis using evolution algorithm approach
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Ant colony optimization algorithm for load balancing in grid computing
Published 2012Get full text
Get full text
Get full text
Monograph -
7
-
8
Relationship based replication algorithm for data grid
Published 2014“…The Relationship based Replication algorithm aims to improve the Data Grid performance by reducing the job execution time, bandwidth and storage usage.The RBR was realized using a network simulation (OptorSim) and experiment results revealed that it offers better performance than existing replication algorithms.…”
Get full text
Get full text
Monograph -
9
-
10
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
11
-
12
Online Dynamic Replication and Placement Algorithms for Cost Optimization of Online Social Networks in Two-tier Multi-cloud
Published 2024journal::journal article -
13
Managing Fragmented Database Using BVAGQ-AR Replication Model
Published 2017“…Problem arises when the database is packed with data, but it has lacked of knowledge. If the unreasonable data is used in database replication, it will cause waste of data storage and delay the time taken for a replication process. …”
Get full text
Get full text
Get full text
Article -
14
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was mainly developing using java programming. Apache Tom cat was used as a server in order to run the application smoothly. …”
Get full text
Get full text
Thesis -
15
Binary Vote Assignment on Cloud Quorum Algorithm for Fragmented MyGRANTS Database Replication
Published 2015“…Data replication is one of the mechanisms to manage data since it improves data accessibility and reliability. …”
Get full text
Get full text
Get full text
Article -
16
Managing MyGRANTS Fragmented Database Using Binary Vote Assignment Grid Quorum with Association Rule (BVAGQ-AR) Replication Model
Published 2015“…Nevertheless, if the impractical data is used in database replication, this will cause waste of data storage and the time taken for a replication process will be delayed. …”
Get full text
Get full text
Conference or Workshop Item -
17
Online dynamic replication and placement algorithms for cost optimization of online social networks in two-tier multi-cloud
Published 2024“…Using multiple CSPs to replicate and distribute the data object solves such obstacles. …”
Get full text
Get full text
Get full text
Article -
18
An adaptive data replication and placement for efficient data storage of online social networks using two-tier multi-cloud environment
Published 2022“…Using multiple CSPs to replicate and distribute the data object is a solution to such obstacles. …”
Get full text
Get full text
Article -
19
Dynamic replication algorithm in data grid: Survey
Published 2008“…For improving the performance of file accesses and to ease the sharing amongst distributed collaboration, such a system needs replication services. Data replication is a common method used to improve the performance of data access in distributed systems. …”
Get full text
Get full text
Get full text
Book Section -
20
Message based random variable length key encryption algorithm.
Published 2009Get full text
Get full text
Article
