Search Results - (( development process replication algorithm ) OR ( java feature encryption algorithm ))
Search alternatives:
- replication algorithm »
- process replication »
- feature encryption »
- java »
-
1
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
2
Managing Heterogeneous Database Replication Using Persistence Layer Synchronous Replication (PLSR)
Published 2013“…The main objective of this algorithm is to develop an adaptive persistence layer which consisted of reliable and smooth replication. …”
Get full text
Get full text
Get full text
Article -
3
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique contains three approaches; first approach is string encryption. The string encryption is about adding a mathematical equation with arrays and loops to the strings in the code to hide the meaning. …”
Get full text
Get full text
Thesis -
4
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
Get full text
Get full text
Thesis -
5
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
6
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
7
Generalization of Map Details within Computer Assisted Cartography
Published 1992“…subjectivity in generalization, the metamorphasis from manual to digital techniques in cartography has resulted in the development of computer algorithms designed to replicate many tasks previously performed by humans. …”
Get full text
Get full text
Article -
8
A Self-Adaptive Agent-Based Dynamic Processes Simulation Modelling Framework
Published 2023Conference Paper -
9
A sequential handwriting recognition model based on a dynamically configurable convolution recurrent neural network and hybrid salp swarm algorithm
Published 2024“…The practical applications of handwriting recognition in many of the current real-world applications rely on the processing of sequential texts, where the language must be detected with efficiency, suggesting the development of a flexible handwriting recognition model. …”
Get full text
Get full text
Thesis -
10
Face Detection System / Chan Beh Teng
Published 2004“…The Face Detection System is implemented in visual Basic 6.0 The system was developed based on the Unified Process,which uses object-oriented paradigm as the basis of software development.…”
Get full text
Get full text
Thesis -
11
An enhanced ant colony system algorithm for dynamic fault tolerance in grid computing
Published 2020“…Most fault tolerance algorithms focus on fault handling techniques such as task reprocessing, checkpointing, task replication, penalty, and task migration. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
13
Towards a self-adaptive agent-based simulation model
Published 2023“…The capability to self-adapt will allow the model to be easily extended and replicated. The self-adapt capability is enabled by a governing algorithm within the model and is conceptually illustrated through a case study of crime report process ABS modelling. � 2005 - 2016 JATIT & LLS. …”
Article -
14
Design of smart waste bin and prediction algorithm for waste management in household area
Published 2018“…All data will be normalized in the pre-processing stage before proceeding to the prediction using Visual Gene Developer. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Routing problem in rectangular mesh network using Dijkstra’s based Greedy method
Published 2018“…A supercomputer can have thousands of replicated processor-memory pairs which are called processing pins. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR)
Published 2026“…Python 3.13 is used for dataset processing and EPDL model building. Upon converting PE files to images, the deep learning pixel-matching algorithm identifies obscured malware features. …”
thesis::doctoral thesis -
17
Study of hand gesture recognition using impulse radio ultra wideband (IRUWB) radar sensor
Published 2023“…Documentation of the development process ensures the methodology and findings are well-documented for reference and replication. …”
Get full text
Get full text
Get full text
Thesis -
18
-
19
-
20
Development of a chemical kinetic model for hydroprocessed renwable jet fuel for turbine engines
Published 2022“…The detailed chemical kinetic models of fuel are developed to investigate the combustion characteristics of the turbine engines in Computational Fluid Dynamics (CFD) simulations. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
