Search Results - (( _ application server algorithm ) OR ( web application ((need algorithm) OR (bat algorithm)) ))*

Refine Results
  1. 1

    Efficient DNS based Load Balancing for Bursty Web Application Traffic by Chin, Mei Lu, Chong, Eng Tan, Mohamad Imran, Bin Bandan

    Published 2012
    “…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm by Muhammad Syahril Mohamad Sainal

    Published 2022
    “…This research will conduct comparison of hybrid Genetic Algorithm and Bat Algorithm (GA-BA) with Genetic Algorithm (GA) and Bat Algorithm (BA). …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  3. 3

    Soap performance enhancement for high volume messaging / Ali Baba Dauda by Ali Baba , Dauda

    Published 2018
    “…To achieve this aim, LZ77 compression algorithm is modified to encode more symbols. The algorithm is then integrated into two Web services with HTTP and JMS bindings. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6
  7. 7

    Development of a Web Access Control Technique Based User Access Behavior by Abdelrahman, Selmaelsheikh

    Published 2004
    “…Previous studies have not yet designed such a system that is reliable enough for such critical applications. This thesis discusses about designs and develops techniques and algorithms for performing web access control. …”
    Get full text
    Get full text
    Thesis
  8. 8

    A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim by Ibrahim, Mohd Faisal

    Published 2017
    “…For this to happen, applications need to have some mechanism that can estimate the network bandwidth by simply adjusting their behavior based on the collected network characteristics information. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…This paper is written to present one of such algorithms to prevent SOA attacks on RESTful web services along the discussion on the obtained results of the conducted proof-of-concept on the real-time SOA environment. …”
    Get full text
    Get full text
    Article
  11. 11

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…This paper is written to present one of such algorithms to prevent SOA attacks on RESTful web services along the discussion on the obtained results of the conducted proof-of-concept on the real-time SOA environment. …”
    Get full text
    Get full text
    Article
  12. 12
  13. 13
  14. 14

    Employing Public Key Infrastructure to Encapsulate Messages During Transport Layer Security Handshake Procedure by Nayeem Ahmad, Khan, Adnan Shahid, Khan, Seleviawati, Tarmizi, Azlina, Ahmadi Julaihi, Zeeshan, Ahmad

    Published 2022
    “…When communicating between client and server, these algorithms address challenges like confidentiality, integrity, availability, and non-repudiation. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  15. 15

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…Therefore, efficient and robust servers that process separate client connections in separate threads are needed. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A survey on QoS requirements based on particle swarm optimization scheduling techniques for workflow scheduling in cloud computing by Ramadhan, Mazen Farid Ebrahim, Latip, Rohaya, Hussin, Masnida, Abdul Hamid, Nor Asilah Wati

    Published 2020
    “…This is aimed at assisting users to decide on the most suitable QoS consideration for large workflows in infrastructure as a service (IaaS) cloud applications and mapping tasks to resources. Besides, the scheduling schemes are categorized according to the variant of the PSO algorithm implemented. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Enhanced 3D terrain visualization process using game engine by Mohd Hafiz, Mahayudin

    Published 2018
    “…This is due to the compression and the need for Unity3D web player to make contact with the Unity server for authentication and also for visualization during online. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Data hiding mobile application by using encryption and decryption / Nuha Bakizah Mohd Asri by Mohd Asri, Nuha Bakizah

    Published 2021
    “…The phenomenal growth of e-commerce applications in the World Wide Web requires the need to increase the security of data communications over the Internet, especially for highly sensitive document transfer. …”
    Get full text
    Get full text
    Student Project
  19. 19

    Intuitive content management system via manipulation and duplication with if-else rules classification by Chan, Chung Hoong

    Published 2018
    “…However, static websites load faster than dynamic ones, since the content is delivered as-is and can be cached by a content delivery network (CDN), and the web server does not need to perform any application logic or database queries. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Monitoring cathodic protection system for underground pipeline by Thai, Seng Choong

    Published 2013
    “…As the world is emerging into mobile technology, an innovative plan was made to combine traditional monitoring system into smart phones mobile application. An electronic prototype were designed, fabricated and tested to monitor the pipelines drain point voltage, transformer rectifier voltage, shunt current, humidity and temperature using a local server system whereby all the data collected are stored on a local storage before synchronizing to the internet’s web server database using the cloud system. …”
    Get full text
    Get full text
    Thesis