Search Results - (( development among replication algorithm ) OR ( java code classification algorithm ))
Search alternatives:
- replication algorithm »
- code classification »
- development among »
- among replication »
- java »
-
1
Object-Oriented Programming semantics representation utilizing agents
Published 2011“…A formal algorithm that can be applied to any two related Java-based source codes examples is invented to generate the semantics of these source codes. …”
Get full text
Get full text
Get full text
Article -
2
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…Build up a user interface by using Visual Studio Code (VSC) to run the coding of Cascading Style Sheet (CSS), Hyper Text Markup Language (HTML) and JavaScript (JS) as a webpage and connect to Azure Machine Learning Model and this will allow the user from using the model from a webpage when they have active internet with any devices.…”
Get full text
Get full text
Monograph -
3
Development of read-one-write-all synchronization transaction daemon (row A-STD) in distributed system
Published 2010“…A new algorithm has been designed and developed to manage replication and transaction using ROW A-MSTS prototype. …”
Get full text
Get full text
Research Report -
4
Unlocking insights: A comprehensive dataset analysis on the acceptance of computational thinking skills among undergraduate university students through the lens of extended techno...
Published 2024“…This dataset stands among the pioneering efforts to assess the novel covariance-based structural equation model algorithm within SmartPLS 4, presenting a valuable resource for future research employing the same mechanism.…”
Get full text
Get full text
Get full text
Article -
5
Access control model based on trust, purpose, and role in materialized view for privacy protection
Published 2019“…Despite the recent advances in access control models, there are still issues that impede the development of effective access control. Among them is the lack of assessments for the user to authorize access, which comprises reliance on identity, purpose, and role. …”
Get full text
Get full text
Thesis
