Search Results - (( developing system replication algorithm ) OR ( java implementation during algorithm ))
Search alternatives:
- replication algorithm »
- implementation during »
- java implementation »
- system replication »
- during algorithm »
-
1
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
2
Dynamic replication algorithm in data grid: Survey
Published 2008Get full text
Get full text
Get full text
Book Section -
3
Development of read-one-write-all synchronization transaction daemon (row A-STD) in distributed system
Published 2010“…A new algorithm has been designed and developed to manage replication and transaction using ROW A-MSTS prototype. …”
Get full text
Get full text
Research Report -
4
Managing Heterogeneous Database Replication Using Persistence Layer Synchronous Replication (PLSR)
Published 2013“…The main objective of this algorithm is to develop an adaptive persistence layer which consisted of reliable and smooth replication. …”
Get full text
Get full text
Get full text
Article -
5
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
6
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
7
Secured agriculture sensor data based on end-to-end encryption using raspberry pi
Published 2025“…The system integrates multiple robust encryption algorithms—AES-128, AES-256, ChaCha20, and Twofish—for end-to-end data protection. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
An enhanced ant colony system algorithm for dynamic fault tolerance in grid computing
Published 2020“…Most fault tolerance algorithms focus on fault handling techniques such as task reprocessing, checkpointing, task replication, penalty, and task migration. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
10
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…The system is capable in operating an off-line programming method, starting from its programming sequences until robotic implementation of the program. During early stages, the research is emphasis more towards designing a robotic system using RoboLab software and C++ programming language. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Data Hiding Techniques In Digital Images
Published 2003“…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
Get full text
Get full text
Thesis -
12
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…Before developing the system, study on characteristics of RSS is conducted to help the design, development and implementation of the proposed system. The proposed system is then designed and developed using Java programming language. …”
Get full text
Get full text
Thesis -
13
A Novel Path Prediction Strategy for Tracking Intelligent Travelers
Published 2009“…This research aims to develop a novel path prediction system which could keep track of the traveler during temporary shortage of actual positioning data. …”
Get full text
Get full text
Thesis -
14
Face Detection System / Chan Beh Teng
Published 2004“…The Face Detection System is implemented in visual Basic 6.0 The system was developed based on the Unified Process,which uses object-oriented paradigm as the basis of software development.…”
Get full text
Get full text
Thesis -
15
Adaptive neurofuzzy inference system for an active transfemoral prosthetic leg using in-socket sensory system / Nur Hidayah Mohd Yusof
Published 2019“…The first part of this work is the development of an Adaptive Neurofuzzy Inference System (ANFIS) - based algorithm to human gait phase recognition. …”
Get full text
Get full text
Get full text
Thesis -
16
Study of hand gesture recognition using impulse radio ultra wideband (IRUWB) radar sensor
Published 2023“…This work addresses the limitations of existing systems and focuses on developing a novel hand gesture recognition system that leverages Impulse Radio Ultra-Wide Band (IR-UWB) radar sensors. …”
Get full text
Get full text
Get full text
Thesis -
17
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
18
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To prevent overfitting, early stopping is used to monitor validation loss during training and dropout rate of 0.3 are applied. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR)
Published 2026“…Malware, such as spyware, ransomware, and self-replicating worms, is designed to steal credentials and gain remote access while obfuscating its code to evade detection by traditional analysis systems. …”
thesis::doctoral thesis -
20
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis
