Search Results - (( java application during algorithm ) OR ( data replication from algorithm ))
Search alternatives:
- application during »
- java application »
- during algorithm »
- replication from »
- from algorithm »
-
1
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
2
Binary Vote Assignment on Cloud Quorum Algorithm for Fragmented MyGRANTS Database Replication
Published 2015“…Data replication is one of the mechanisms to manage data since it improves data accessibility and reliability. …”
Get full text
Get full text
Get full text
Article -
3
A novel deadlock detection algorithm for neighbour replication on grid environment
Published 2012“…The use of three to five transactions is in NRG the data will be replicated into three to five sites. …”
Get full text
Get full text
Thesis -
4
BVAGQ-AR for Fragmented Database Replication Management
Published 2021“…The result from the experiment shows that handling fragmented database synchronous replication through proposed BVAGQ-AR algorithm able to preserve data consistency in distributed environment.…”
Get full text
Get full text
Get full text
Article -
5
Dynamic replication aware load blanced scheduling in distributed environment / Said Bakhshad
Published 2018“…Several algorithms have been proposed and studied for scheduling and data replication, however a little research has been done so far on capturing and minimizing the migration rate of data from an existing available replica site to a next site on the basis of data scheduling in order to minimize the transfers and deletion rate. …”
Get full text
Get full text
Get full text
Thesis -
6
A novel binary vote assignment grid quorum algorithm for distributed database fragmentation
Published 2011“…Data replication is one of the mechanisms in data grid architecture since it improves data access and reliability. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Binary vote assignment on grid quorum replication technique with association rule
Published 2018“…First step is mining the data by using Apriori algorithm from Association Rules. …”
Get full text
Get full text
Thesis -
8
Improving response time, availability and reliability through asynchronous replication technique in cluster architecture of web server cluster
Published 2010“…This paper proposes an algorithm of data replication scheme based on asynchronous replication in order to improve web server cluster system reliability. …”
Get full text
Get full text
Conference or Workshop Item -
9
Fault Tolerence on Binary Vote Assignment Cloud Quorum (BVACQ) Replication Technique
Published 2013“…It also increases the degrees of data availability. This is because the missing data from during the server failure has been reconciled and replicated after that server recovered.…”
Get full text
Get full text
Conference or Workshop Item -
10
Efficient access of replicated data in distributed database systems
Published 2001“…Replication is a useful technique for distributed database systems where a data object will be accessed (Le., read and written) from multiple locations such as from a local area network environment or geographically distributed world wide. …”
Get full text
Get full text
Thesis -
11
Fault Tolerance On Binary Vote Assignment Cloud Quorum (BVACQ) Replication Technique
Published 2013“…It also increases the degrees of data availability. This is be cause the missing data from during the server failure has been reconciled and replicated after that server recovered.…”
Get full text
Get full text
Conference or Workshop Item -
12
Exploration of machine learning forecasting methods in M4 competition / Muhammad Halim Hamdan and Shuzlina Abdul-Rahman
Published 2021“…There are so many forecasting algorithms and techniques available. The abilities of Data Mining to obtain and gather data from multiple sources is very useful to researcher, practitioner, business and more. …”
Get full text
Get full text
Get full text
Article -
13
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
14
A technique of dispatching algorithms for web-server cluster
Published 2011Get full text
Working Paper -
15
Re-engineering grid-based quorum replication into binary vote assignment on cloud: A scalable approach for strong consistency in cloud databases
Published 2025“…This study proposes the Binary Vote Assignment in Cloud (BVAC), a cloud-native replication algorithm re-engineered from the Binary Vote Assignment on Grid Quorum (BVAGQ). …”
Get full text
Get full text
Get full text
Article -
16
Data-driven multi-fault detection in pipelines utilizing frequency response function and artificial neural networks
Published 2025“…The subsequent data processing stage involved the application of an ANN algorithm for pattern recognition to analyze and classify the acquired data, identifying patterns associated with the replicated fault conditions. …”
Get full text
Get full text
Get full text
Article -
17
A Novel Wrapper-Based Optimization Algorithm for the Feature Selection and Classification
Published 2023“…Thus, this study has proposed a novel wrapper-based Sand Cat SwarmOptimization (SCSO) technique as an FS approach to find optimum features from ten benchmark medical datasets. The SCSO algorithm replicates the hunting and searching strategies of the sand cat while having the advantage of avoiding local optima and finding the ideal solution with minimal control variables. …”
Get full text
Get full text
Article -
18
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
19
Enhancing clustering algorithm with initial centroids in tool wear region recognition
Published 2020“…Precision and robustness analysis have proved F-km to score 100% attainment for clustering assignment output and replicability. In contrast, K-means scored 76.3% for precision and ranging from 5 to 33% for robustness. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Secured electrocardiograph (ECG) signal using partially homomorphic encryption technique–RSA algorithm
Published 2020“…This is to record confidentially and prevent the information from meddling, imitating and replicating. First, Pan and Tompkins’s algorithm was applied to perform the ECG signal processing. …”
Get full text
Get full text
Get full text
Article
