Search Results - (( ((its application) OR (job application)) use algorithm ) OR ( _ application server algorithm ))
Search alternatives:
- application server »
- server algorithm »
- job application »
- use algorithm »
-
1
Locust- inspired meta-heuristic algorithm for optimising cloud computing performance
Published 2023“…This algorithm can also be used for task scheduling. The proposed algorithm efficiently maps and achieves the objective function for server consolidation, optimising energy consumption, VM migrations, and server utilisation. …”
Get full text
Get full text
Thesis -
2
-
3
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
Get full text
Get full text
Thesis -
4
Performance evaluation of task scheduling using hybrid meta-heuristic in heterogeneous cloud environment
Published 2019“…It is an essential role of cloud computing to enable sharing of resources on-demand over the network including servers, applications, storage, services, and database to the end-users who are remotely connected to the network. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Performance evaluation of task scheduling using hybrid meta-heuristic in heterogeneous cloud environment
Published 2019“…It is an essential role of cloud computing to enable sharing of resources on-demand over the network including servers, applications, storage, services, and database to the end-users who are remotely connected to the network. …”
Get full text
Get full text
Get full text
Article -
6
-
7
An optimal tasks scheduling algorithm based on QoS in cloud computing network
Published 2017“…These resources contain storage, servers, and other applications and it provides security, flexibility, and sealability. …”
Get full text
Get full text
Thesis -
8
-
9
-
10
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The new replication process will also be used in e-commerce application to secure user transaction information. …”
Get full text
Get full text
Thesis -
12
-
13
-
14
-
15
A study on one way hashing function and its application for FTMSK webmail / Mohd Rosli Mohd Daud
Published 2007Get full text
Get full text
Research Reports -
16
-
17
Green data center by incentive-based job scheduling approach
Published 2019“…While free air cooling strategy is used elsewhere, it is not generally applicable in tropical countries such as that in Malaysia. …”
Get full text
Get full text
Conference or Workshop Item -
18
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…Presently, many researches have been made on remote monitoring and its techniques. The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
Get full text
Get full text
Thesis -
19
-
20
Optimization of Workload Allocation Problem in a Network of Heterogeneous Computer Systems
Published 2005“…Other service distributional models such as exponential, Erlang-k and Gamma have also been used to expand the work applicability. A new algorithm of workload allocation scheme using First Come First Serve discipline in conjunction with optimization of GE queueing systems is proposed for minimizing mean queue length and mean response time in a network of computer systems. …”
Get full text
Get full text
Get full text
Thesis
