Search Results - (( data replication designing algorithm ) OR ( java application during algorithm ))
Search alternatives:
- replication designing »
- designing algorithm »
- application during »
- java application »
- during algorithm »
-
1
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…Nowadays, in the grid community, distributed and clustering system, a lot of work has been focused on providing efficient and safe replication management services through designing of algorithms and systems. …”
Get full text
Get full text
Thesis -
2
Improving response time, availability and reliability through asynchronous replication technique in cluster architecture of web server cluster
Published 2010“…This paper proposes an algorithm of data replication scheme based on asynchronous replication in order to improve web server cluster system reliability. …”
Get full text
Get full text
Conference or Workshop Item -
3
Development of read-one-write-all synchronization transaction daemon (row A-STD) in distributed system
Published 2010“…A new algorithm has been designed and developed to manage replication and transaction using ROW A-MSTS prototype. …”
Get full text
Get full text
Research Report -
4
Efficient access of replicated data in distributed database systems
Published 2001Get full text
Get full text
Thesis -
5
A framework for implementing asynchronous replication scheme in utility-based computing environment
Published 2016“…Therefore, we propose an intelligent framework that can reinforce an effective resource selection scheme by allowing the components that give impact on the performance such as resource/data freshness of the replicated system in such environment to be considered. …”
Get full text
Get full text
Conference or Workshop Item -
6
A Framework for Asynchronous Replication Scheme for Utility-based Computing Environment
Published 2015“…Therefore, we propose an intelligent framework that can reinforce an effective resource selection scheme by allowing the components that give impact on the performance such as resource/data freshness of the replicated system in such environment to be considered. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Re-engineering grid-based quorum replication into binary vote assignment on cloud: A scalable approach for strong consistency in cloud databases
Published 2025“…The study establishes BVAC as an advancement in distributed data management and a foundation for future adaptive and multi-cloud replication frameworks.…”
Get full text
Get full text
Get full text
Article -
8
A technique of dispatching algorithms for web-server cluster
Published 2011Get full text
Working Paper -
9
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
10
-
11
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
12
Finite element modeling and updating for dynamic study of exhaust structure
Published 2020“…Due to disagreement between numerical result and experimental data in correlation process, the FE model has been updated using SOL200 algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Integration of simulation for ergonomics assessment in operation control centre (railway industries) / Adib Zulfadhli Mohd Alias
Published 2019“…As human-machine interface grow more immersive and graphically-oriented, ergonomics assessment can be simulated with the integration of different design software to replicate real life operation. …”
Get full text
Get full text
Get full text
Thesis -
14
A Novel Path Prediction Strategy for Tracking Intelligent Travelers
Published 2009“…The FCM nodes are a novel selection of kinematical factors. Genetic algorithm (GA) is then used to train the FCM to be able to replicate the decisional behaviors of the intelligent traveler. …”
Get full text
Get full text
Thesis -
15
-
16
-
17
Securing IoT networks using machine learning-resistant physical unclonable functions (PUFs) on edge devices
Published 2026“…Physical Unclonable Functions (PUFs) provide a lightweight, hardware-based security primitive that exploits inherent device-specific variations to ensure uniqueness, unpredictability, and enhanced protection of data and user privacy. Additionally, modeling attacks against PUF architectures is challenging due to the random and unpredictable physical variations inherent in their design, making it nearly impossible for attackers to accurately replicate their unique responses. …”
Get full text
Get full text
Get full text
Article -
18
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
19
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis -
20
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
