Search Results - (( develop computer replication algorithm ) OR ( java _ normalization algorithm ))
Search alternatives:
- normalization algorithm »
- replication algorithm »
- computer replication »
- develop computer »
-
1
-
2
Dynamic replication algorithm in data grid: Survey
Published 2008Get full text
Get full text
Get full text
Book Section -
3
-
4
Generalization of Map Details within Computer Assisted Cartography
Published 1992“…subjectivity in generalization, the metamorphasis from manual to digital techniques in cartography has resulted in the development of computer algorithms designed to replicate many tasks previously performed by humans. …”
Get full text
Get full text
Article -
5
Improving resource management with multi-instance broker scheduling algorithm in hierarchical grid computing
Published 2016“…The designed modules is in the form of algorithms, GridSim, Java Development Kits and Java Language used to support the design process whereas the Netbeans software serves as the platform to simulate the experiment so as to obtain the results. …”
Get full text
Get full text
Get full text
Thesis -
6
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
7
An enhanced ant colony system algorithm for dynamic fault tolerance in grid computing
Published 2020“…Most fault tolerance algorithms focus on fault handling techniques such as task reprocessing, checkpointing, task replication, penalty, and task migration. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
9
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
10
Face Detection System / Chan Beh Teng
Published 2004“…The aim of this project is to replicate on a computer what humans beings are able to do so effortlessly - detect the presence of the faces in their field of vision. …”
Get full text
Get full text
Thesis -
11
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
12
-
13
Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR)
Published 2026thesis::doctoral thesis -
14
-
15
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
16
Unlocking insights: A comprehensive dataset analysis on the acceptance of computational thinking skills among undergraduate university students through the lens of extended techno...
Published 2024“…This high explanatory power positions the dataset as a superior resource for replication, benchmarking, and broader applicability in diverse contexts, thereby enhancing the understanding of computational thinking acceptance across different populations and settings. …”
Get full text
Get full text
Get full text
Article -
17
Development of a chemical kinetic model for hydroprocessed renwable jet fuel for turbine engines
Published 2022“…The detailed chemical kinetic models of fuel are developed to investigate the combustion characteristics of the turbine engines in Computational Fluid Dynamics (CFD) simulations. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
-
19
Al-Istikhlāf framework in the age of artificial intelligence: reclaiming the human identity and responsibility in the digital era
Published 2025“…Drawing on Qur’ānic exegesis, classical Islamic scholarship, and contemporary AI ethics, it contrasted natural intelligence with machine computation and highlighted the unique moral, spiritual, and teleological dimensions of humanity that cannot be replicated by algorithms. …”
Get full text
Get full text
Get full text
Article -
20
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…In addition, the proposed M2FS method is developed through WEKA API with Java Programming language using the IDE of Eclipse Java. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
