Search Results - (( _ application ((amh algorithm) OR (means algorithm)) ) OR ( its application server algorithm ))*
Search alternatives:
- application server »
- server algorithm »
- means algorithm »
- amh algorithm »
-
1
Extensions to the K-AMH algorithm for numerical clustering
Published 2018Get full text
Get full text
Get full text
Article -
2
Partitional clustering algorithms for highly similar and sparseness y-short tandem repeat data / Ali Seman
Published 2013“…Out of six data sets, the &-AMH algorithm obtained the highest mean accuracy scores for the five data sets and one data set was at equal performance. …”
Get full text
Get full text
Thesis -
3
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
-
5
-
6
Mobility-aware Offloading Decision For Multi-access Edge Computing In 5g Networks
Published 2024journal::journal article -
7
Performance analysis of voice codec for VoIP
Published 2008Get full text
Get full text
Get full text
Thesis -
8
-
9
Efficient DNS based Load Balancing for Bursty Web Application Traffic
Published 2012“…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
Get full text
Get full text
Get full text
Article -
10
-
11
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
Get full text
Get full text
Thesis -
12
-
13
-
14
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…This technique also introduces a multi thread based persistence layer, which supports early binding and parallel connection to the servers. All the replication servers established its connection through interfaces. …”
Get full text
Get full text
Thesis -
15
Efficient Discovery Protocol for Ubiquitous Communication in Wireless Environment
Published 2009“…In an Ad-hoc network which its devices make an ubiquitous computing environment, every device as a server node can announce various applications as services in the environment and at the same time every device is able to listen to the network interface and be aware of surrounding services and invoke the remote services.A mechanism which is needed to recognize surrounding services is called service discovery, this mechanism also clears how to advertise services, and invoke them. …”
Get full text
Get full text
Thesis -
16
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…Presently, many researches have been made on remote monitoring and its techniques. The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
Get full text
Get full text
Thesis -
17
Peer to peer trade in HTM5 meta model for agent oriented cloud robotic systems
Published 2015“…These cloud servers treat robots as any other client computer offering them platform, infrastructure, process or algorithm as a service. …”
Get full text
Get full text
Article -
18
Hybridflood algorithms minimizing redundant messages and maximizing efficiency of search in unstructured P2P networks
Published 2012“…However, in a typical client-server network, as a client joins the network it only shares its demands, not its resources. …”
Get full text
Get full text
Thesis -
19
Improving the quality of service of fixed WiMAX networks by decreasing application response time using a distributed model
Published 2022“…A brand new distributed Client-Server model was designed for the fixed WiMAX Network in order to reduce application response time. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
SELAMAT: a new secure and lightweight multi-factor authentication scheme for cross-platform industrial IoT systems
Published 2021“…Fog users at the network’s edge communicate with many fog servers in different fogs and newly joined servers that they had never contacted before. …”
Get full text
Get full text
Article
