Search Results - (( developing network replication algorithm ) OR ( java application during algorithm ))
Search alternatives:
- replication algorithm »
- network replication »
- developing network »
- application during »
- java application »
- during algorithm »
-
1
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
2
Dynamic replication algorithm in data grid: Survey
Published 2008Get full text
Get full text
Get full text
Book Section -
3
Development of read-one-write-all synchronization transaction daemon (row A-STD) in distributed system
Published 2010“…A new algorithm has been designed and developed to manage replication and transaction using ROW A-MSTS prototype. …”
Get full text
Get full text
Research Report -
4
Routing problem in rectangular mesh network using Dijkstra’s based Greedy method
Published 2018“…Therefore, developing a shortest path based routing algorithm is in need. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Secured agriculture sensor data based on end-to-end encryption using raspberry pi
Published 2025“…Additionally, a benchmarking tool was developed to evaluate and compare the performance of these algorithms in terms of speed, memory, CPU usage, and encryption overhead. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
7
A sequential handwriting recognition model based on a dynamically configurable convolution recurrent neural network and hybrid salp swarm algorithm
Published 2024“…The built DCCRNN is based on the Salp Swarm optimization Algorithm (SSA), a processor that given a particular dataset will find the best CRNN’s structure and hyperparameters. …”
Get full text
Get full text
Thesis -
8
Proactive multi-copy routing protocol for urban vehicular ad hoc network
Published 2016“…A vehicular network topology is very dynamic compared to traditional mobile ad hoc network because of the movement and speed of the vehicles. …”
Get full text
Get full text
Get full text
Article -
9
Proactive multi-copy routing protocol for urban vehicular ad hoc network
Published 2015“…A vehicular network topology is very dynamic compared to traditional mobile ad hoc network because of the movement and speed of the vehicles. …”
Get full text
Get full text
Get full text
Article -
10
Finger-Vein Biometric Identification Using Convolutional Neural Network
Published 2016“…In this paper, a reduced-complexity four-layer CNN with fused convolutional-subsampling architecture is proposed for finger-vein recognition. For network training, we have modified and applied the stochastic diagonal Levenberg-Marquardt algorithm, which results in a faster convergence time. …”
Get full text
Get full text
Get full text
Article -
11
-
12
Design of smart waste bin and prediction algorithm for waste management in household area
Published 2018“…This project has proposed Artificial Neural Network (ANN) based prediction algorithm that can forecast Solid Waste Generation (SWG) based on household size factor. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
14
-
15
A Novel Path Prediction Strategy for Tracking Intelligent Travelers
Published 2009“…The FCM nodes are a novel selection of kinematical factors. Genetic algorithm (GA) is then used to train the FCM to be able to replicate the decisional behaviors of the intelligent traveler. …”
Get full text
Get full text
Thesis -
16
-
17
-
18
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
19
Development of low-overhead soft error mitigation technique for safety critical neural networks applications
Published 2021“…Deep Neural Networks (DNNs) have been widely applied in healthcare applications. …”
Get full text
Get full text
Thesis -
20
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis
