Search Results - (( development time replication algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- replication algorithm »
- development time »
- time replication »
- java application »
-
1
Managing Heterogeneous Database Replication Using Persistence Layer Synchronous Replication (PLSR)
Published 2013“…The main objective of this algorithm is to develop an adaptive persistence layer which consisted of reliable and smooth replication. …”
Get full text
Get full text
Get full text
Article -
2
A novel deadlock detection algorithm for neighbour replication on grid environment
Published 2012“…A new framework and algorithm called Neighbour Replication on Grid Deadlock Detection (NRGDD) has been developed to handle deadlock cycles that exist during the transaction in Neighbour Replication on Grid (NRG) environment. …”
Get full text
Get full text
Thesis -
3
Development of read-one-write-all synchronization transaction daemon (row A-STD) in distributed system
Published 2010“…A new algorithm has been designed and developed to manage replication and transaction using ROW A-MSTS prototype. …”
Get full text
Get full text
Research Report -
4
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
5
An enhanced ant colony system algorithm for dynamic fault tolerance in grid computing
Published 2020“…The proposed algorithm was developed in a simulated grid environment called GridSim and evaluated against other fault tolerance algorithms such as trust-based ACO, fault tolerance ACO, ACO without fault tolerance and ACO with fault tolerance in terms of total execution time, average latency, average makespan, throughput, execution success rate and load balancing. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Secured agriculture sensor data based on end-to-end encryption using raspberry pi
Published 2025“…Additionally, a benchmarking tool was developed to evaluate and compare the performance of these algorithms in terms of speed, memory, CPU usage, and encryption overhead. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
8
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR)
Published 2026“…These integrations reduce detection latency and false positives while supporting timely threat mitigation. The findings of this research will provide a valuable foundation for future researchers seeking to develop improved datasets and enhance malware detection and response models.…”
thesis::doctoral thesis -
10
-
11
Development of a chemical kinetic model for hydroprocessed renwable jet fuel for turbine engines
Published 2022“…J3_246 was also validated against the detailed counterpart in terms of ID timings in 0- D chemical kinetic simulation. J3_246 was able to replicate the ignition behaviour of the detailed models and hence J3_246 can be used to represent the HRJ surrogate fuel model in CFD simulations.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Study of hand gesture recognition using impulse radio ultra wideband (IRUWB) radar sensor
Published 2023“…Documentation of the development process ensures the methodology and findings are well-documented for reference and replication. …”
Get full text
Get full text
Get full text
Thesis -
13
Finger-Vein Biometric Identification Using Convolutional Neural Network
Published 2016“…For network training, we have modified and applied the stochastic diagonal Levenberg-Marquardt algorithm, which results in a faster convergence time. …”
Get full text
Get full text
Get full text
Article -
14
An autonomous wheelchair speed control using fuzzy logic controller / Muhammad Ashraf Mohamad Ghazali
Published 2025“…The triangular membership function was confirmed as the optimal choice due to its faster response time and computational efficiency. Despite minor hardware limitations, including an encoder malfunction that produced inconsistent speed readings, the system effectively adjusted motor speed based on real-time terrain conditions. …”
Get full text
Get full text
Thesis -
15
Bouc-Wen model parameter identification for a new magneto-rheologigal fluid damper using particle swarm optimization
Published 2014“…Hence, Particle Swarm Optimization (PSO) was introduced for altering significant parameters for Bouc-Wen hysteresis model to replicate the MR fluid damper performance in real-time. …”
Get full text
Get full text
Thesis -
16
Proactive multi-copy routing protocol for urban vehicular ad hoc network
Published 2016“…The simulation results in an urban grid model show that the proposed multi-copy forwarding protocol is able to deliver packets at small delivery delay compared to a single-copy forwarding algorithm without having to rely on real time traffic data or flooding mechanism.…”
Get full text
Get full text
Get full text
Article -
17
Proactive multi-copy routing protocol for urban vehicular ad hoc network
Published 2015“…The simulation results in an urban grid model show that the proposed multi-copy forwarding protocol is able to deliver packets at small delivery delay compared to a single-copy forwarding algorithm without having to rely on real time traffic data or flooding mechanism…”
Get full text
Get full text
Get full text
Article -
18
Design and development of a digging device for harvesting sweet potato
Published 2010“…All experiments were replicated three times at a constant speed of 0.06 m.s-1. …”
Get full text
Get full text
Thesis -
19
Parameters of Artificial Intelligence (AI) in Fatwa Issuance: A Jurisprudential and Technological Ethics Analysis
Published 2026journal::journal article -
20
Determination of transfer capability considering risk and reliability cost/ worth assessment in dynamic and static system cascading collapses / Nur Ashida Salim
Published 2015“…The proposed research methodology involved developing an algorithm commenced with a fault occurrence and then followed by the propagation of power system component tripping events which is defined as the system cascading collapse. …”
Get full text
Get full text
Thesis
