Search Results - (( java application customization algorithm ) OR ( using scale replication algorithm ))
Search alternatives:
- customization algorithm »
- replication algorithm »
- scale replication »
- java application »
- using scale »
-
1
Replica Creation Algorithm for Data Grids
Published 2012“…Current algorithms focus on number of accesses in deciding which file to replicate and where to place them, which ignores resources’ capabilities. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
A cluster-based hybrid replica control protocol for high availability in data grid
Published 2019“…In Data Grid, data replication is a widely used technique for managing data, where exact copies of data or replicas are created and stored at many distributed sites. …”
Get full text
Get full text
Thesis -
3
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
4
Face Detection System / Chan Beh Teng
Published 2004“…Skin regions are then separated from skin regions by segmenting the gray-scale image. After that, the system will locate the frontal human face(s) within the skin regions, using template matching. …”
Get full text
Get full text
Thesis -
5
Data-driven multi-fault detection in pipelines utilizing frequency response function and artificial neural networks
Published 2025“…The subsequent data processing stage involved the application of an ANN algorithm for pattern recognition to analyze and classify the acquired data, identifying patterns associated with the replicated fault conditions. …”
Get full text
Get full text
Get full text
Article -
6
Adaptive medium access control protocol of Wifi-Halow for home machine-to-machine network
Published 2019“…The increasing exibility of wireless network card used also raises the concern of resources availability due to selfish attack. …”
Get full text
Get full text
Thesis -
7
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Signal to noise ratio as a guideline to obtain valid auditory brainstem response results
Published 2020“…Typically, the technique uses to identify a true ABR is by using response replication analysis. …”
Get full text
Get full text
Get full text
Article
