Search Results - (( based replication protocol algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 10 results of 10
Refine Results
  1. 1

    Efficient access of replicated data in distributed database systems by Mat Deris, Mustafa

    Published 2001
    “…The TDGS protocol is based on the logical structure of sites/serquorum in the DDS. …”
    Get full text
    Get full text
    Thesis
  2. 2

    A cluster-based hybrid replica control protocol for high availability in data grid by Mabni, Zulaile

    Published 2019
    “…This research has contributed a dynamic cluster-based hybrid replica control protocol which proposed a clustering algorithm to determine the number of clusters, a mechanism for dynamic participation of nodes in the network, and a replica placement algorithm that produces low communication cost and high data availability as compared to DH and DDG protocols. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Brain tumor quantification equation: modeled on complete step response algorithm by Aboaba, Abdulfattah A., Hameed, Shihab A., Khalifa, Othman Omran, Hassan Abdalla Hashim, Aisha, Harun, Rahmat, Zain, Norzaini Rose Mohd

    Published 2012
    “…What is presented here is a novel brain tumor quantification method based on step response algorithm utilizing a model which itself was based on step response model resulting in smart and rapid quantification of brain tumor volume.…”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  5. 5
  6. 6
  7. 7

    An enhanced fingerprint template protection scheme by Siswanto, Apri

    Published 2022
    “…Furthermore, an improved chaos-based encryption algorithm was proposed for encrypting FT. …”
    Get full text
    Get full text
    Thesis
  8. 8

    A self-adaptive agent-based simulation modelling framework for dynamic processes by Ling, Loo Yim, Dr.

    Published 2023
    “…Agent-based simulation (ABS) modelling had been a prevalent approach for simulation of dynamic processes of various domains. …”
    text::Thesis
  9. 9
  10. 10

    Securing IoT networks using machine learning-resistant physical unclonable functions (PUFs) on edge devices by Sheikh, Abdul Manan, Islam, Md. Rafiqul, Habaebi, Mohamed Hadi, Zabidi, Suriza Ahmad, Najeeb, Athaur Rahman, Baloch, Mazhar

    Published 2026
    “…Physical Unclonable Functions (PUFs) provide a lightweight, hardware-based security primitive that exploits inherent device-specific variations to ensure uniqueness, unpredictability, and enhanced protection of data and user privacy. …”
    Get full text
    Get full text
    Get full text
    Article