Search Results - (( development process replication algorithm ) OR ( java data normalization algorithm ))
Search alternatives:
- normalization algorithm »
- replication algorithm »
- process replication »
- data normalization »
- java »
-
1
Managing Heterogeneous Database Replication Using Persistence Layer Synchronous Replication (PLSR)
Published 2013“…The main objective of this algorithm is to develop an adaptive persistence layer which consisted of reliable and smooth replication. …”
Get full text
Get full text
Get full text
Article -
2
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
3
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
4
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
5
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
6
Generalization of Map Details within Computer Assisted Cartography
Published 1992“…subjectivity in generalization, the metamorphasis from manual to digital techniques in cartography has resulted in the development of computer algorithms designed to replicate many tasks previously performed by humans. …”
Get full text
Get full text
Article -
7
A Self-Adaptive Agent-Based Dynamic Processes Simulation Modelling Framework
Published 2023Conference Paper -
8
A sequential handwriting recognition model based on a dynamically configurable convolution recurrent neural network and hybrid salp swarm algorithm
Published 2024“…The practical applications of handwriting recognition in many of the current real-world applications rely on the processing of sequential texts, where the language must be detected with efficiency, suggesting the development of a flexible handwriting recognition model. …”
Get full text
Get full text
Thesis -
9
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
10
Face Detection System / Chan Beh Teng
Published 2004“…The Face Detection System is implemented in visual Basic 6.0 The system was developed based on the Unified Process,which uses object-oriented paradigm as the basis of software development.…”
Get full text
Get full text
Thesis -
11
An enhanced ant colony system algorithm for dynamic fault tolerance in grid computing
Published 2020“…Most fault tolerance algorithms focus on fault handling techniques such as task reprocessing, checkpointing, task replication, penalty, and task migration. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
13
Towards a self-adaptive agent-based simulation model
Published 2023“…The capability to self-adapt will allow the model to be easily extended and replicated. The self-adapt capability is enabled by a governing algorithm within the model and is conceptually illustrated through a case study of crime report process ABS modelling. � 2005 - 2016 JATIT & LLS. …”
Article -
14
Design of smart waste bin and prediction algorithm for waste management in household area
Published 2018“…All data will be normalized in the pre-processing stage before proceeding to the prediction using Visual Gene Developer. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Routing problem in rectangular mesh network using Dijkstra’s based Greedy method
Published 2018“…A supercomputer can have thousands of replicated processor-memory pairs which are called processing pins. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR)
Published 2026“…Python 3.13 is used for dataset processing and EPDL model building. Upon converting PE files to images, the deep learning pixel-matching algorithm identifies obscured malware features. …”
thesis::doctoral thesis -
17
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Study of hand gesture recognition using impulse radio ultra wideband (IRUWB) radar sensor
Published 2023“…Documentation of the development process ensures the methodology and findings are well-documented for reference and replication. …”
Get full text
Get full text
Get full text
Thesis -
19
-
20
