Search Results - (( development program replication algorithm ) OR ( java three generalized algorithm ))
Search alternatives:
- replication algorithm »
- generalized algorithm »
- development program »
- three generalized »
- java »
-
1
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
2
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
3
-
4
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…To improve secure of data in cloud storage by hybrid three algorithms (AES, ECC and RSA).All the existing algorithms has some sort of problems and issues, this had made us decide to develop a safe, correct ad efficient algorithm for having secured data in cloud storage. …”
Get full text
Get full text
Get full text
Thesis -
5
Detection and extraction features for signatures images via different techniques
Published 2019Get full text
Get full text
Conference or Workshop Item -
6
-
7
-
8
-
9
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
10
-
11
Object-Oriented Programming semantics representation utilizing agents
Published 2011“…A formal algorithm that can be applied to any two related Java-based source codes examples is invented to generate the semantics of these source codes. …”
Get full text
Get full text
Get full text
Article -
12
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. The dataset created using the proposed data engineering system is then used to train unidirectional Long Short Term Memory (LSTM) model to evaluate the efficiency of proposed system in terms of accuracy and generalization capabilities. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
-
14
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The proposed DetectCombined is an innovated technique that execute a protection code based on a sequence of three stages: filtration-validation-history, this technique produces a robust protection code that distinguish between safe SQL commands and malicious ones, and reinforce the memory of detection procedure by saving previous SQL attacks in special tables in the remote database, regardless of the types of users whether a general user of admin. …”
Get full text
Get full text
Get full text
Article -
15
-
16
An integrated model of automated elementary programming feedback using assisted and recommendation approach
Published 2017“…This enhancement was evaluated on three ordinal datasets on different application domain covering 67 Java programs, 92 students’ marks on computer architecture subject and 456 EUFA’s football club coefficient ranking list. …”
Get full text
Get full text
Get full text
Thesis -
17
