Search Results - (( developing new replication algorithm ) OR ( java data normalization algorithm ))

Refine Results
  1. 1

    Managing Heterogeneous Database Replication Using Persistence Layer Synchronous Replication (PLSR) by Noraziah, Ahmad, Abdalla, Ahmed N., Beg, Abul Hashem

    Published 2013
    “…The main objective of this algorithm is to develop an adaptive persistence layer which consisted of reliable and smooth replication. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    A novel deadlock detection algorithm for neighbour replication on grid environment by Noriyani, Mohd Zin

    Published 2012
    “…Therefore, an action must be taken to detect and solve this problem. A new framework and algorithm called Neighbour Replication on Grid Deadlock Detection (NRGDD) has been developed to handle deadlock cycles that exist during the transaction in Neighbour Replication on Grid (NRG) environment. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…Even a normal people using clustering to grouping their data. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13

    A novel approach to motion modeling using fuzzy cognitive map and artificial potential fields by Motlagh, Omid Reza Esmaeili, Tang, Sai Hong, Ramli, Abdul Rahman, Ismail, Napsiah, Nakhaeinia, Danial

    Published 2010
    “…A novel decision modeling technique is developed based on capabilities of the fuzzy cognitive map (FCM) and supervised learning using the genetic algorithm (GA). …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15

    3D imaging techniques in documentation of cultural assets in Malaysia by Md. Sharif, Harlina, Hazumi, Hazman, Saedin, Nurfarhanah

    Published 2015
    “…Despite worldwide rapid development in 3D imaging technologies, documentation of 3D cultural assets in Malaysia is still very much reliant upon conventional techniques. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    3D documenatation of the petalaindera: Digital heritage preservation methods using 3D laser scanner and photogrammetry by Md Sharif, Harlina, Hazumi, Hazman, Meli, Rafiq Hafizuddin

    Published 2018
    “…Despite this rapid development, documentation of 3D cultural assets in Malaysia is still very much reliant upon conventional techniques such as measured drawings and manual photogrammetry. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  17. 17

    3D documentation of the Petalaindera: digital heritage preservation methods using 3D laser scanner and photogrammetry by Md. Sharif, Harlina, Hazumi, Hazman, Meli, Rafiq Hafizuddin

    Published 2017
    “…Despite this rapid development, documentation of 3D cultural assets in Malaysia is still very much reliant upon conventional techniques such as measured drawings and manual photogrammetry. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  18. 18

    3D documenatation of the petalaindera: Digital heritage preservation methods using 3D laser scanner and photogrammetry by Md. Sharif, Harlina, Hazumi, Hazman, Meli, Rafiq Hafizuddin

    Published 2018
    “…Despite this rapid development, documentation of 3D cultural assets in Malaysia is still very much reliant upon conventional techniques such as measured drawings and manual photogrammetry. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Access control model based on trust, purpose, and role in materialized view for privacy protection by Salji, Mohd Rafiz

    Published 2019
    “…A prototype system is developed and tested, and the result shows that sensitive attributes are protected. …”
    Get full text
    Get full text
    Thesis
  20. 20