Search Results - (( java application modified algorithm ) OR ( data replication designing algorithm ))
Search alternatives:
- replication designing »
- application modified »
- designing algorithm »
- java application »
-
1
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…Nowadays, in the grid community, distributed and clustering system, a lot of work has been focused on providing efficient and safe replication management services through designing of algorithms and systems. …”
Get full text
Get full text
Thesis -
2
Improving response time, availability and reliability through asynchronous replication technique in cluster architecture of web server cluster
Published 2010“…This paper proposes an algorithm of data replication scheme based on asynchronous replication in order to improve web server cluster system reliability. …”
Get full text
Get full text
Conference or Workshop Item -
3
Development of read-one-write-all synchronization transaction daemon (row A-STD) in distributed system
Published 2010“…A new algorithm has been designed and developed to manage replication and transaction using ROW A-MSTS prototype. …”
Get full text
Get full text
Research Report -
4
Efficient access of replicated data in distributed database systems
Published 2001Get full text
Get full text
Thesis -
5
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
6
A framework for implementing asynchronous replication scheme in utility-based computing environment
Published 2016“…Therefore, we propose an intelligent framework that can reinforce an effective resource selection scheme by allowing the components that give impact on the performance such as resource/data freshness of the replicated system in such environment to be considered. …”
Get full text
Get full text
Conference or Workshop Item -
7
A Framework for Asynchronous Replication Scheme for Utility-based Computing Environment
Published 2015“…Therefore, we propose an intelligent framework that can reinforce an effective resource selection scheme by allowing the components that give impact on the performance such as resource/data freshness of the replicated system in such environment to be considered. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Re-engineering grid-based quorum replication into binary vote assignment on cloud: A scalable approach for strong consistency in cloud databases
Published 2025“…The study establishes BVAC as an advancement in distributed data management and a foundation for future adaptive and multi-cloud replication frameworks.…”
Get full text
Get full text
Get full text
Article -
9
A technique of dispatching algorithms for web-server cluster
Published 2011Get full text
Working Paper -
10
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
11
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
Get full text
Get full text
Conference or Workshop Item -
12
-
13
Finite element modeling and updating for dynamic study of exhaust structure
Published 2020“…Due to disagreement between numerical result and experimental data in correlation process, the FE model has been updated using SOL200 algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Integration of simulation for ergonomics assessment in operation control centre (railway industries) / Adib Zulfadhli Mohd Alias
Published 2019“…As human-machine interface grow more immersive and graphically-oriented, ergonomics assessment can be simulated with the integration of different design software to replicate real life operation. …”
Get full text
Get full text
Get full text
Thesis -
15
A Novel Path Prediction Strategy for Tracking Intelligent Travelers
Published 2009“…The FCM nodes are a novel selection of kinematical factors. Genetic algorithm (GA) is then used to train the FCM to be able to replicate the decisional behaviors of the intelligent traveler. …”
Get full text
Get full text
Thesis -
16
Securing IoT networks using machine learning-resistant physical unclonable functions (PUFs) on edge devices
Published 2026“…Physical Unclonable Functions (PUFs) provide a lightweight, hardware-based security primitive that exploits inherent device-specific variations to ensure uniqueness, unpredictability, and enhanced protection of data and user privacy. Additionally, modeling attacks against PUF architectures is challenging due to the random and unpredictable physical variations inherent in their design, making it nearly impossible for attackers to accurately replicate their unique responses. …”
Get full text
Get full text
Get full text
Article -
17
Revolutionizing energy infrastructure: Automated route planning for underground transmission lines in Phnom Penh
Published 2024“…This study presents a solution that automates the shortest route method for determining the optimal path for routing UTL power supply cables between any two substations. Multiple algorithms are evaluated to identify the most effective solution to this design’s inherent shortest-path problem. …”
Get full text
Get full text
Get full text
Article -
18
-
19
An autonomous wheelchair speed control using fuzzy logic controller / Muhammad Ashraf Mohamad Ghazali
Published 2025“…The hardware integration combines vibration sensor, DC motor with encoders and Arduino Uno microcontroller that supported by Python for real-time data processing, user interface visualization and data storage. …”
Get full text
Get full text
Thesis -
20
Parameters of Artificial Intelligence (AI) in Fatwa Issuance: A Jurisprudential and Technological Ethics Analysis
Published 2026journal::journal article
