Search Results - (( development process interception algorithm ) OR ( java _ replication algorithm ))

  • Showing 1 - 6 results of 6
Refine Results
  1. 1

    Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar by Jaafar, Mohd Izhar

    Published 2012
    “…It have increase complexity of process encryption and decryption. New integration also have an extra value security because of the symmetric algorithm was developed locally in Malaysia. …”
    Get full text
    Get full text
    Thesis
  2. 2

    An efficient likelihood-based modulation classification algorithm for multiple-input multiple-output systems by Bahloul, M.R., Yusoff, M.Z., Abdel-Aty, A.-H., Saad, M.N.M.

    Published 2016
    “…To overcome the problems associated with the existing likelihood-based MC algorithms, a new algorithm is developed in this paper. …”
    Get full text
    Get full text
    Article
  3. 3

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Development of algorithm for single axis sun tracking system by Yi, L.Z., Singh, B.S.M., Ching, D.L.C., Jin, C.L.E.

    Published 2016
    “…The proposed algorithm displays real-time processed data that would enable users to understand the trend of the SEGS output for maintenance prediction and optimization purposes. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A cluster-based hybrid replica control protocol for high availability in data grid by Mabni, Zulaile

    Published 2019
    “…Another proposed algorithm is replica placement algorithm which selects and places only one replica in each cluster. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A classifier mechanism for host based intrusion detection and prevention system in cloud computing environment by Al-Zarqawee, Aws Naser

    Published 2018
    “…The mechanism’s design is based on the hybrid Antlion Optimization Algorithm (ALO) with Multilayer Perceptron (MLP) to protect against DDoS attacks. …”
    Get full text
    Get full text
    Thesis