Search Results - (( integer implementation extraction algorithm ) OR ( java data replication algorithm ))
Search alternatives:
- implementation extraction »
- integer implementation »
- replication algorithm »
- extraction algorithm »
- java »
-
1
ZOT -Mk: A New Algorithm For Big Integer Multiplication
Published 2009“…Since the multiplication on integers is not native to the computer architecture numbering structure of bits and bytes, such algorithms are bound to be a bit slower on the implementation. …”
Get full text
Get full text
Thesis -
2
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The motivation of implementation is to make sure the data replication is easy to maintain and cost effective. …”
Get full text
Get full text
Thesis -
3
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
Published 2019“…The Hybrid Cube Encryption Algorithm (HiSea) has been implemented to validate the encryption keys that are generated from the proposed algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
A cluster-based hybrid replica control protocol for high availability in data grid
Published 2019“…In Data Grid, data replication is a widely used technique for managing data, where exact copies of data or replicas are created and stored at many distributed sites. …”
Get full text
Get full text
Thesis -
5
Key generation technique based on triangular coordinate extraction for hybrid cubes
Published 2017“…In this study, we extend the hybrid cube encryption algorithm (HiSea) and our earlier Triangular Coordinate Extraction (TCE) technique for HC by increasing the complexity in the mathematical approaches. …”
Get full text
Get full text
Article -
6
Reverse logistics network optimizing by genetic algorithm: a case study of automotive wiring harnesses
Published 2014“…Thus, an evolutionary algorithm based genetic algorithm (GA) is applied as a solution methodology to solve mixed integer linear programming model and find the optimum solution. …”
Get full text
Get full text
Get full text
Article -
7
Randomized pixel selection for enhancing LSB algorithm security against brute-force attack
Published 2017“…One of the most effortless and widely-used techniques is the age-old Least Significant Bits (LSB) algorithm, which can be implemented in both transformative and spatial domains. …”
Get full text
Get full text
Article -
8
