Search Results - (( developing its replication algorithm ) OR ( java implementation modified algorithm ))
Search alternatives:
- implementation modified »
- replication algorithm »
- java implementation »
- its replication »
- developing its »
-
1
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
2
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
3
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
4
Managing Heterogeneous Database Replication Using Persistence Layer Synchronous Replication (PLSR)
Published 2013“…The main objective of this algorithm is to develop an adaptive persistence layer which consisted of reliable and smooth replication. …”
Get full text
Get full text
Get full text
Article -
5
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
6
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
7
Development of read-one-write-all synchronization transaction daemon (row A-STD) in distributed system
Published 2010“…A new algorithm has been designed and developed to manage replication and transaction using ROW A-MSTS prototype. …”
Get full text
Get full text
Research Report -
8
A bibliometric analysis: AI-driven data placement optimization in cloud replication environments
Published 2024“…Several studies have examined this area, aiming to enhance data replication techniques by integrating AI algorithms. …”
Get full text
Get full text
Get full text
Article -
9
An enhanced ant colony system algorithm for dynamic fault tolerance in grid computing
Published 2020“…Most fault tolerance algorithms focus on fault handling techniques such as task reprocessing, checkpointing, task replication, penalty, and task migration. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Routing problem in rectangular mesh network using Dijkstra’s based Greedy method
Published 2018“…In order to achieve this objective, each net need to be routed as shortest as possible. Therefore, developing a shortest path based routing algorithm is in need. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
12
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
13
Study of hand gesture recognition using impulse radio ultra wideband (IRUWB) radar sensor
Published 2023“…Data collection experiments yield a diverse dataset of hand gestures, including variations in speed, essential for algorithm development. The developed algorithms interpret raw IR-UWB radar sensor data and associate it with specific hand gestures, addressing the core objective of gesture recognition. …”
Get full text
Get full text
Get full text
Thesis -
14
A sequential handwriting recognition model based on a dynamically configurable convolution recurrent neural network and hybrid salp swarm algorithm
Published 2024“…The empirical results display that the proposed DC-CRNN and its SSA hybridization are capable of autonomously finding and selecting the best CRNN for a specific dataset. …”
Get full text
Get full text
Thesis -
15
A novel approach to motion modeling using fuzzy cognitive map and artificial potential fields
Published 2010“…The robot trajectory under supply of such decision matrices has likelihood of nearly 90% with its trajectory under the APF. Replication of robot motion is therefore achieved by modeling its decision behaviors in form of tangible matrices.…”
Get full text
Get full text
Conference or Workshop Item -
16
Designing an expressive virtual Kompang on mobile device with tri-axial accelerometer
Published 2018“…An application of the virtual instrument for Kompang is described with an evaluation of the system with ideas for future developments. Result from the study showed that the feature extraction algorithm had an accuracy of 86.78% at detecting drum hit at its peak acceleration value. …”
Get full text
Get full text
Get full text
Article -
17
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…Meanwhile, the second MAS model has been designed using two agents as follows: the first agent is a fault current agent that is to determine the fault current at all points before and after grounding; the second agent is the time operating of the agent which is used to determine the relay operating time before and after modifying fault current. The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
Get full text
Get full text
Thesis -
18
Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR)
Published 2026“…Malware, such as spyware, ransomware, and self-replicating worms, is designed to steal credentials and gain remote access while obfuscating its code to evade detection by traditional analysis systems. …”
thesis::doctoral thesis -
19
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…There is also a need to consider implementing this strategy for dynamic object-oriented languages such as Python, Lisp, and Smalltalk.…”
Get full text
Get full text
Thesis -
20
Evaluation of SongketChain : A Framework to Protect Unique Cultural Product using Blockchain Technology
Published 2025“…This study evaluates the effectiveness of SongketChain through a comparative analysis of blockchain platforms and consensus algorithms, highlighting the framework's potential to mitigate counterfeit issues and support the sustainable development of the Songket market. …”
Get full text
Get full text
Get full text
Get full text
Article
