Search Results - (( data replication designing algorithm ) OR ( java application during algorithm ))

Refine Results
  1. 1

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…Nowadays, in the grid community, distributed and clustering system, a lot of work has been focused on providing efficient and safe replication management services through designing of algorithms and systems. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Improving response time, availability and reliability through asynchronous replication technique in cluster architecture of web server cluster by Aznida Hayati, Zakaria@Mohamad, Ahmad Nazari, Mohd Rose, Zarina, Mohamad, Wan Suryani, Wan Awang

    Published 2010
    “…This paper proposes an algorithm of data replication scheme based on asynchronous replication in order to improve web server cluster system reliability. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3
  4. 4
  5. 5

    A framework for implementing asynchronous replication scheme in utility-based computing environment by Wan Nor Shuhadah, W.N., Zhou, B.B., Zomaya, A.Y., Abawajy, J.H.

    Published 2016
    “…Therefore, we propose an intelligent framework that can reinforce an effective resource selection scheme by allowing the components that give impact on the performance such as resource/data freshness of the replicated system in such environment to be considered. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    A Framework for Asynchronous Replication Scheme for Utility-based Computing Environment by Wan Nor Shuhadah, Wan Nik, Zhou, Bing Bing, Zomaya, Albert Y

    Published 2015
    “…Therefore, we propose an intelligent framework that can reinforce an effective resource selection scheme by allowing the components that give impact on the performance such as resource/data freshness of the replicated system in such environment to be considered. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7
  8. 8
  9. 9

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  10. 10
  11. 11

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  12. 12

    Finite element modeling and updating for dynamic study of exhaust structure by M. S. M., Fouzi, M. S. M., Sani

    Published 2020
    “…Due to disagreement between numerical result and experimental data in correlation process, the FE model has been updated using SOL200 algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Integration of simulation for ergonomics assessment in operation control centre (railway industries) / Adib Zulfadhli Mohd Alias by Adib Zulfadhli, Mohd Alias

    Published 2019
    “…As human-machine interface grow more immersive and graphically-oriented, ergonomics assessment can be simulated with the integration of different design software to replicate real life operation. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    A Novel Path Prediction Strategy for Tracking Intelligent Travelers by Motlagh, Omid Reza Esmaeili

    Published 2009
    “…The FCM nodes are a novel selection of kinematical factors. Genetic algorithm (GA) is then used to train the FCM to be able to replicate the decisional behaviors of the intelligent traveler. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17

    Securing IoT networks using machine learning-resistant physical unclonable functions (PUFs) on edge devices by Sheikh, Abdul Manan, Islam, Md. Rafiqul, Habaebi, Mohamed Hadi, Zabidi, Suriza Ahmad, Najeeb, Athaur Rahman, Baloch, Mazhar

    Published 2026
    “…Physical Unclonable Functions (PUFs) provide a lightweight, hardware-based security primitive that exploits inherent device-specific variations to ensure uniqueness, unpredictability, and enhanced protection of data and user privacy. Additionally, modeling attacks against PUF architectures is challenging due to the random and unpredictable physical variations inherent in their design, making it nearly impossible for attackers to accurately replicate their unique responses. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
    Get full text
    Get full text
    Thesis
  20. 20

    Human activity recognition via accelerometer and gyro sensors by Tee, Jia Lin

    Published 2023
    “…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis