Search Results - (( development its replication algorithm ) OR ( java application optimisation algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- replication algorithm »
- java application »
- development its »
- its replication »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
Managing Heterogeneous Database Replication Using Persistence Layer Synchronous Replication (PLSR)
Published 2013“…The main objective of this algorithm is to develop an adaptive persistence layer which consisted of reliable and smooth replication. …”
Get full text
Get full text
Get full text
Article -
3
Development of read-one-write-all synchronization transaction daemon (row A-STD) in distributed system
Published 2010“…A new algorithm has been designed and developed to manage replication and transaction using ROW A-MSTS prototype. …”
Get full text
Get full text
Research Report -
4
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
5
A bibliometric analysis: AI-driven data placement optimization in cloud replication environments
Published 2024“…Several studies have examined this area, aiming to enhance data replication techniques by integrating AI algorithms. …”
Get full text
Get full text
Get full text
Article -
6
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
7
An enhanced ant colony system algorithm for dynamic fault tolerance in grid computing
Published 2020“…Most fault tolerance algorithms focus on fault handling techniques such as task reprocessing, checkpointing, task replication, penalty, and task migration. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Routing problem in rectangular mesh network using Dijkstra’s based Greedy method
Published 2018“…In order to achieve this objective, each net need to be routed as shortest as possible. Therefore, developing a shortest path based routing algorithm is in need. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
10
Study of hand gesture recognition using impulse radio ultra wideband (IRUWB) radar sensor
Published 2023“…Data collection experiments yield a diverse dataset of hand gestures, including variations in speed, essential for algorithm development. The developed algorithms interpret raw IR-UWB radar sensor data and associate it with specific hand gestures, addressing the core objective of gesture recognition. …”
Get full text
Get full text
Get full text
Thesis -
11
A sequential handwriting recognition model based on a dynamically configurable convolution recurrent neural network and hybrid salp swarm algorithm
Published 2024“…The empirical results display that the proposed DC-CRNN and its SSA hybridization are capable of autonomously finding and selecting the best CRNN for a specific dataset. …”
Get full text
Get full text
Thesis -
12
A novel approach to motion modeling using fuzzy cognitive map and artificial potential fields
Published 2010“…The robot trajectory under supply of such decision matrices has likelihood of nearly 90% with its trajectory under the APF. Replication of robot motion is therefore achieved by modeling its decision behaviors in form of tangible matrices.…”
Get full text
Get full text
Conference or Workshop Item -
13
Designing an expressive virtual Kompang on mobile device with tri-axial accelerometer
Published 2018“…An application of the virtual instrument for Kompang is described with an evaluation of the system with ideas for future developments. Result from the study showed that the feature extraction algorithm had an accuracy of 86.78% at detecting drum hit at its peak acceleration value. …”
Get full text
Get full text
Get full text
Article -
14
Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR)
Published 2026“…Malware, such as spyware, ransomware, and self-replicating worms, is designed to steal credentials and gain remote access while obfuscating its code to evade detection by traditional analysis systems. …”
thesis::doctoral thesis -
15
Evaluation of SongketChain : A Framework to Protect Unique Cultural Product using Blockchain Technology
Published 2025“…This study evaluates the effectiveness of SongketChain through a comparative analysis of blockchain platforms and consensus algorithms, highlighting the framework's potential to mitigate counterfeit issues and support the sustainable development of the Songket market. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Finger-Vein Biometric Identification Using Convolutional Neural Network
Published 2016“…The proposed CNN is tested on a finger-vein database developed in-house that contains 50 subjects with 10 samples from each finger. …”
Get full text
Get full text
Get full text
Article -
17
-
18
Al-Istikhlāf framework in the age of artificial intelligence: reclaiming the human identity and responsibility in the digital era
Published 2025“…Drawing on Qur’ānic exegesis, classical Islamic scholarship, and contemporary AI ethics, it contrasted natural intelligence with machine computation and highlighted the unique moral, spiritual, and teleological dimensions of humanity that cannot be replicated by algorithms. The article then applied the al-Istikhlāf framework to assess AI’s impact on identity, psychology, social relations, labour, and spiritual life. …”
Get full text
Get full text
Get full text
Article -
19
3D documenatation of the petalaindera: Digital heritage preservation methods using 3D laser scanner and photogrammetry
Published 2018“…This paper presents a completed stage of an exploratory study that investigates the potentials of using CV automated image-based open-source software and web services to reconstruct and replicate cultural assets. By selecting an intricate wooden boat, Petalaindera, this study attempts to evaluate the efficiency of CV systems and compare it with the application of 3D laser scanning, which is known for its accuracy, efficiency and high cost. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
20
3D documentation of the Petalaindera: digital heritage preservation methods using 3D laser scanner and photogrammetry
Published 2017“…This paper presents a completed stage of an exploratory study that investigates the potentials of using CV automated image-based open-source software and web services to reconstruct and replicate cultural assets. By selecting an intricate wooden boat, Petalaindera, this study attempts to evaluate the efficiency of CV systems and compare it with the application of 3D laser scanning, which is known for its accuracy, efficiency and high cost. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
