Search Results - (( dynamic replication selection algorithm ) OR ( java application customization algorithm ))

  • Showing 1 - 11 results of 11
Refine Results
  1. 1

    Enhanced replication strategy with balanced quorum technique and data center selection method in cloud environment by Mohd Ali, Fazlina

    Published 2022
    “…In this research, there are three (3) main contributions proposed for a cloud replication environment. Firstly, this research proposed an Enhanced Replication Strategy (ERS) that improves response time for file download in a replication cloud environment without neglecting the popular file selection. …”
    Get full text
    Get full text
    Thesis
  2. 2

    A cluster-based hybrid replica control protocol for high availability in data grid by Mabni, Zulaile

    Published 2019
    “…Another proposed algorithm is replica placement algorithm which selects and places only one replica in each cluster. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A sequential handwriting recognition model based on a dynamically configurable convolution recurrent neural network and hybrid salp swarm algorithm by Ahmed Ali Mohammed, Al-saffar

    Published 2024
    “…The built DCCRNN is based on the Salp Swarm optimization Algorithm (SSA), a processor that given a particular dataset will find the best CRNN’s structure and hyperparameters. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Finite Element Modelling and Updating of Motorcycle Structure with Suitable Length of Connecting Element by M. S. M., Sani, K. M., Jelani, N. A. Z., Abdullah, M. N., Abdul Rani, M. A., Yunus

    Published 2023
    “…Two locations were used on the FE model for modelling of welded joints such as CBAR element connector used to replicate spot weld joint. Ahead of the updating process, sensitivity analysis is made to select the most sensitive parameter for updating purpose. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Development of an artisanal fermentation: case studies on Carica papaya leaf and Garcinia Mangostana pericarp / Mohamad Sufian So’aib by So’aib, Mohamad Sufian

    Published 2020
    “…Fermented CPL displayed higher acute toxicity effect (LC50) than fermented GMP i.e. 133.1 μg/mL vs 100.2 μg/mL, respectively. Selected feedforward ANN models with embedded Levenberg-Marquardt algorithm and hyperbolic tangent sigmoid transfer function demonstrated statistical robustness in predicting the process responses. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Virtual screening for potential inhibitors of human hexokinase II for the development of anti-dengue therapeutics by Tanbin, Suriyea, Ahmad Fuad, Fazia Adyani, Abdul Hamid, Azzmer Azzar

    Published 2021
    “…Hu-man hexokinase II (HKII), which is the first enzyme in the glycolytic pathway, is an important drug target due to its significant impact on viral replication and survival in host cells. In this study, 23.1 million compounds were computationally-screened against HKII using the Ultrafast Shape Recognition with a CREDO Atom Types (USRCAT) algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Enhancing teaching and learning through data-driven optimization of servicing code demand and lecturer allocation using WEKA analysis by Rochin Demong, Nur Atiqah, Mohamed Razali, Murni Zarina, Kamaruddin, Juliana Noor, Shamsuddin, Sazwan, Awang, Nor Ain, Kamarudin, Norjuliatie, Wan Othman, Noor Faradilla

    Published 2025
    “…Practically, it offers a replicable analytical framework for institutions seeking to forecast servicing code demand and align lecturer allocation strategies with real time dynamics and cost optimization goals.…”
    Get full text
    Get full text
    Get full text
    Article