Search Results - (( development time replication algorithm ) OR ( java data normalization algorithm ))
Search alternatives:
- normalization algorithm »
- replication algorithm »
- data normalization »
- development time »
- time replication »
- java »
-
1
Managing Heterogeneous Database Replication Using Persistence Layer Synchronous Replication (PLSR)
Published 2013“…The main objective of this algorithm is to develop an adaptive persistence layer which consisted of reliable and smooth replication. …”
Get full text
Get full text
Get full text
Article -
2
A novel deadlock detection algorithm for neighbour replication on grid environment
Published 2012“…A new framework and algorithm called Neighbour Replication on Grid Deadlock Detection (NRGDD) has been developed to handle deadlock cycles that exist during the transaction in Neighbour Replication on Grid (NRG) environment. …”
Get full text
Get full text
Thesis -
3
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
4
Development of read-one-write-all synchronization transaction daemon (row A-STD) in distributed system
Published 2010“…A new algorithm has been designed and developed to manage replication and transaction using ROW A-MSTS prototype. …”
Get full text
Get full text
Research Report -
5
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
6
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
8
An enhanced ant colony system algorithm for dynamic fault tolerance in grid computing
Published 2020“…The proposed algorithm was developed in a simulated grid environment called GridSim and evaluated against other fault tolerance algorithms such as trust-based ACO, fault tolerance ACO, ACO without fault tolerance and ACO with fault tolerance in terms of total execution time, average latency, average makespan, throughput, execution success rate and load balancing. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Secured agriculture sensor data based on end-to-end encryption using raspberry pi
Published 2025“…Additionally, a benchmarking tool was developed to evaluate and compare the performance of these algorithms in terms of speed, memory, CPU usage, and encryption overhead. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
11
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR)
Published 2026“…These integrations reduce detection latency and false positives while supporting timely threat mitigation. The findings of this research will provide a valuable foundation for future researchers seeking to develop improved datasets and enhance malware detection and response models.…”
thesis::doctoral thesis -
13
-
14
Development of a chemical kinetic model for hydroprocessed renwable jet fuel for turbine engines
Published 2022“…J3_246 was also validated against the detailed counterpart in terms of ID timings in 0- D chemical kinetic simulation. J3_246 was able to replicate the ignition behaviour of the detailed models and hence J3_246 can be used to represent the HRJ surrogate fuel model in CFD simulations.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Study of hand gesture recognition using impulse radio ultra wideband (IRUWB) radar sensor
Published 2023“…Documentation of the development process ensures the methodology and findings are well-documented for reference and replication. …”
Get full text
Get full text
Get full text
Thesis -
16
Finger-Vein Biometric Identification Using Convolutional Neural Network
Published 2016“…For network training, we have modified and applied the stochastic diagonal Levenberg-Marquardt algorithm, which results in a faster convergence time. …”
Get full text
Get full text
Get full text
Article -
17
An autonomous wheelchair speed control using fuzzy logic controller / Muhammad Ashraf Mohamad Ghazali
Published 2025“…The triangular membership function was confirmed as the optimal choice due to its faster response time and computational efficiency. Despite minor hardware limitations, including an encoder malfunction that produced inconsistent speed readings, the system effectively adjusted motor speed based on real-time terrain conditions. …”
Get full text
Get full text
Thesis -
18
Bouc-Wen model parameter identification for a new magneto-rheologigal fluid damper using particle swarm optimization
Published 2014“…Hence, Particle Swarm Optimization (PSO) was introduced for altering significant parameters for Bouc-Wen hysteresis model to replicate the MR fluid damper performance in real-time. …”
Get full text
Get full text
Thesis -
19
Proactive multi-copy routing protocol for urban vehicular ad hoc network
Published 2016“…The simulation results in an urban grid model show that the proposed multi-copy forwarding protocol is able to deliver packets at small delivery delay compared to a single-copy forwarding algorithm without having to rely on real time traffic data or flooding mechanism.…”
Get full text
Get full text
Get full text
Article -
20
Proactive multi-copy routing protocol for urban vehicular ad hoc network
Published 2015“…The simulation results in an urban grid model show that the proposed multi-copy forwarding protocol is able to deliver packets at small delivery delay compared to a single-copy forwarding algorithm without having to rely on real time traffic data or flooding mechanism…”
Get full text
Get full text
Get full text
Article
