Search Results - (( java application clustering algorithm ) OR ( data replication testing algorithm ))*
Search alternatives:
- application clustering »
- replication testing »
- testing algorithm »
- java application »
-
1
A novel deadlock detection algorithm for neighbour replication on grid environment
Published 2012“…The aim of this research is to handle the deadlock problem in NRG to preserve the consistency of data and increase the throughput. The NRGDD simulation model has been developed to test the algorithm on NRG. …”
Get full text
Get full text
Thesis -
2
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
3
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…The prototypes will be developed using JAVA language united with a MySQL database. Core functionality of the simulator are job generation, volunteer generation, simulating algorithms, generating graphical charts and generating reports. …”
Get full text
Get full text
Final Year Project -
4
-
5
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
A web-based implementation of k-means algorithms
Published 2022“…Firstly, k-luster could incorporate additional clustering algorithms, or even classification algorithms in the future. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
-
8
Exploration of machine learning forecasting methods in M4 competition / Muhammad Halim Hamdan and Shuzlina Abdul-Rahman
Published 2021“…Each technique was replicated, trained and tested accordingly. M4 competition dataset was used in this research, with 100,000 time series data and multiple data frequency, which is enough to replicate the real-world situation. …”
Get full text
Get full text
Get full text
Article -
9
Finite element modeling and updating for dynamic study of exhaust structure
Published 2020“…Hence, this paper is carried out to reduce the discrepancies between numerical prediction results with measured test data on FE model of exhaust structure by implementing FE model updating using SOL200 algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Rockfall source identification using a hybrid Gaussian mixture-ensemble machine learning model and LiDAR data
Published 2019“…Moreover, the proposed model has achieved the optimal prediction accuracies (92%) on the basis of testing data, thereby indicating that the model can be generalised and replicated in different regions, and the proposed method can be applied to various landslide studies.…”
Get full text
Get full text
Get full text
Article -
11
A Novel Wrapper-Based Optimization Algorithm for the Feature Selection and Classification
Published 2023“…Additionally, the Wilcoxon rank test was used to perform the significance analysis between the proposed SCSOKNN method and six other algorithms for a p-value less than 5.00E-02. …”
Get full text
Get full text
Article -
12
Enhancing clustering algorithm with initial centroids in tool wear region recognition
Published 2020“…K-means clustering has become the most applied algorithm in discovering classes in an unsupervised scenario. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
An integrated model of automated elementary programming feedback using assisted and recommendation approach
Published 2017“…Meanwhile, similar difficulty groups of the computer programs were generated using a K-Means clustering algorithm that was enhanced with ranking consideration. …”
Get full text
Get full text
Get full text
Thesis -
14
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
15
Securing IoT networks using machine learning-resistant physical unclonable functions (PUFs) on edge devices
Published 2026“…The NIST statistical test suite was applied to the CRP data of the RO PUF to evaluate its randomness quality. …”
Get full text
Get full text
Get full text
Article -
16
A self-adaptive agent-based simulation modelling framework for dynamic processes
Published 2023“…Case studies for simulating dynamic processes of new student registration (administrative domain), transport request (transportation domain) and crime investigation (security domain) with real data collected through interview and document reviews to test the proposed idea. …”
text::Thesis -
17
Finger-Vein Biometric Identification Using Convolutional Neural Network
Published 2016“…An identification rate of 100.00% is achieved, with an 80/20 percent ratio for separation of training and test samples, respectively. An additional number of subjects have also been tested, in which for 81 subjects an accuracy of 99.38% is achieved.…”
Get full text
Get full text
Get full text
Article -
18
Access control model based on trust, purpose, and role in materialized view for privacy protection
Published 2019“…This study focuses on data privacy protection in materialized view. Materialized view is a replica of a table which is created in a very large system where data are replicated from the master tables. …”
Get full text
Get full text
Thesis -
19
Mobile Crowd Steering Evacuation Model via Agent Based Simulation by Applying the Social Force Model
Published 2025“…In addition, simulated data can overcome the lack of genuine datasets for specific crowd situations. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Medical identity theft in telemedicine: solving the privacy and security issues
Published 2015“…Hence, the proposed algorithm enables quick and excellent detection capability of any modification done to the medical images.…”
Get full text
Get full text
Monograph
