• Nenhum resultado encontrado

[PDF] Top 20 A Survey on Clustering Techniques and Load Balancing Algorithms

Has 10000 "A Survey on Clustering Techniques and Load Balancing Algorithms" found on our website. Below are the top 20 most common "A Survey on Clustering Techniques and Load Balancing Algorithms".

A Survey on Clustering Techniques and Load Balancing Algorithms

A Survey on Clustering Techniques and Load Balancing Algorithms

... Weighted Clustering Algorithm (WCA) is a combination of weight metric which includes several system parameters such as node speed, node degree, existence with respect to a node’s neighbours, transmission power; ... See full document

4

Efficient Dynamic Load Balancing Algorithms for Multiclass Jobs in Peer to Peer Networks

Efficient Dynamic Load Balancing Algorithms for Multiclass Jobs in Peer to Peer Networks

... literature survey we analyzed how effectively we can use randomization in the load balancing ...problem. On observing the simulations of Li-Kameda [3] and FD algorithm [4], still the ... See full document

5

Load Balancing in Wireless Mesh Network: a Survey

Load Balancing in Wireless Mesh Network: a Survey

... 3.5 Load Balancing in WMNs by Clustering[17] In [17] authors proposed a load balancing schemes for WMNs by ...workload on a GW is increased up tomaximum capacity of the GW then ... See full document

5

A Survey On Detect - Discovering And Evaluating Trust Using Efficient Clustering Technique For Manets

A Survey On Detect - Discovering And Evaluating Trust Using Efficient Clustering Technique For Manets

... behavior, and deters dishonest participation by providing a means through which reputation and ultimately trust can be quantified and ...applications and lead to peer mistrust and ... See full document

7

A survey of data mining & its applications

A survey of data mining & its applications

... Based on the data and the desired outcomes, a data mining algorithm or combination of algorithms is selected for ...These algorithms include classical techniques such as statistics, ... See full document

5

COMBINATION OF DIFFERENCE SUBSPACE AND OPPURTUNISTIC CLUSTERING ON HIGH DIMENSIONAL DATA

COMBINATION OF DIFFERENCE SUBSPACE AND OPPURTUNISTIC CLUSTERING ON HIGH DIMENSIONAL DATA

... Rousseeuw and Hubert (2011) aimed at detecting the attackers by searching for the model using the majority of the ...location and points estimated based on the location pattern which is elaborated ... See full document

8

UNIVERSIDADE NOVA DE LISBOA Faculdade de Ciˆ encias e Tecnologia Departamento de Engenharia Electrot´ ecnica e de Computadores MULTI-REGION ROUTING

UNIVERSIDADE NOVA DE LISBOA Faculdade de Ciˆ encias e Tecnologia Departamento de Engenharia Electrot´ ecnica e de Computadores MULTI-REGION ROUTING

... naming and addressing (these last two are related to the mapping service and were less covered in this ...simpler and more appropriated solutions are defined for each one and the Internet can ... See full document

138

Multilevel Techniques for the Clustering Problem

Multilevel Techniques for the Clustering Problem

... Genetic Algorithms [13] are stochastic methods for global search and optimization and belong to the group of Evolutionary ...examines and manipulates a set of possible ...representation ... See full document

15

A Wide-range Survey on Recall-Based Graphical User Authentications Algorithms Based on ISO and Attack Patterns

A Wide-range Survey on Recall-Based Graphical User Authentications Algorithms Based on ISO and Attack Patterns

... down on papers or even save them in a computer ...systems and Internet-based environments try used GUA technique for their user’s ...GUA algorithms have two different aspects which are usability ... See full document

9

Incremental k-means clustering algorithms: a review

Incremental k-means clustering algorithms: a review

... incremental clustering group the new data and update new clusters to previous clustering ...optimizes clustering process and mainly adapts to those applications where time is a critical ... See full document

5

Alta disponibilidade e balanceamento de carga para a melhoria de sistemas computacionais críticos usando software livre: um estudo de caso

Alta disponibilidade e balanceamento de carga para a melhoria de sistemas computacionais críticos usando software livre: um estudo de caso

... Clusters têm sido construídos e utilizados por mais de duas décadas. Segundo Dantas [DANTAS 2005] o modelo de clusters surgiu em duas diferentes áreas da computação com ligeiras diferenças e motivações. Resume-se em Alto ... See full document

139

Load balancing in real software defined networks

Load balancing in real software defined networks

... demands on the quality of service are always ...tools and manual processes to configure each device, which in many cases can be ...business and technical needs, over the last few decades the network ... See full document

62

A Survey Paper on Fuzzy Image Segmentation Techniques

A Survey Paper on Fuzzy Image Segmentation Techniques

... simplify and/or change the representation of an image into something that is more meaningful and easier to ...objects and boundaries (lines, curves, ...key techniques in image representation ... See full document

6

Performance Evaluation of Modified AODV for Load Balancing

Performance Evaluation of Modified AODV for Load Balancing

... Load balancing deals with improving the performance of the system by transferring the jobs from overloaded nodes to underloaded or idle ...considerably and also makes it sure that no node sits idle ... See full document

6

Distributed Large Dataset Deployment with Improved Load Balancing and Performance

Distributed Large Dataset Deployment with Improved Load Balancing and Performance

... appropriate, on-demand network ...devices and storage ...Storage, and DBaaS Database as a ...common and widespread cloud storage ...availability and integrity, confidentiality ... See full document

4

Neutrosophic Hierarchical Clustering Algoritms

Neutrosophic Hierarchical Clustering Algoritms

... IFS and IVIFS are defined with respect to and �, i.e., membership and nonmembership only, so they can only handle incomplete information but not the indetermine in- ...INS and SVNS, whose ... See full document

7

The Load Balancing of Database Allocation in the Cloud

The Load Balancing of Database Allocation in the Cloud

... nodes and local slave ...database and the application systems ...the load balancing issue for database hosts in the cloud ...efficiently and improving the space utilization for ... See full document

6

A Survey on the Applications of Bee Colony Optimization Techniques

A Survey on the Applications of Bee Colony Optimization Techniques

... (BCO) and its variants are applied have been ...Sato and Hagiwara in 1997 and the Bee Colony Optimization (BCO) was identified by Lucic and Teodorovic in ...combinatorial and NP-hard ... See full document

10

A Study on Preference of Interface Design Techniques for Web Survey

A Study on Preference of Interface Design Techniques for Web Survey

... internet and web-based application, the survey via the internet has been increasingly utilized due to its convenience and time ...web-design techniques - screen design, response format, logo ... See full document

8

Improving Load Balancing in Virtualized Environments using Pearson’s Correlation

Improving Load Balancing in Virtualized Environments using Pearson’s Correlation

... VM and containers for achieving ...stateless and statefull ...storage and be deployed behind load ...the load balancer will send traffic to healthy ...application and the network ... See full document

110

Show all 10000 documents...