Search Results - (( _ application use algorithm ) OR ( ((its application) OR (web application)) server algorithm ))
Search alternatives:
- server algorithm »
- application use »
- use algorithm »
-
1
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
Get full text
Get full text
Thesis -
2
A technique of dispatching algorithms for web-server cluster
Published 2011Get full text
Working Paper -
3
-
4
-
5
A framework of rough cultural algorithms in optimizing mobile web caching performance
Published 2007“…The common cause of poor performance is due to the direct access to the server (e.g. pitiable performance of server-side applications or during burst crowds) and network infrastructure (e.g. long geographical distances, network overloads, etc.). …”
Get full text
Get full text
Article -
6
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Soap performance enhancement for high volume messaging / Ali Baba Dauda
Published 2018“…To achieve this aim, LZ77 compression algorithm is modified to encode more symbols. The algorithm is then integrated into two Web services with HTTP and JMS bindings. …”
Get full text
Get full text
Get full text
Thesis -
8
Enhancement load balancing in failover web server by using HTTP-response status techniques with pfsense opensource / Muhammad Hafiz Ramli
Published 2020“…HTTP-response status techniques are used in the load balancing to ensure the web page is accessible across multiple web server. …”
Get full text
Get full text
Thesis -
9
Web cluster load balancing via genetic-fuzzy based algorithm
Published 2007Get full text
Get full text
Get full text
Article -
10
-
11
-
12
Web based applications for energy management system incorporated network reconfiguration using genetic algorithm / Wan Adnan Wan
Published 2006“…The development on Web Application system uses An ActiveX technology approach. …”
Get full text
Get full text
Thesis -
13
Web Usage Mining for UUM Learning Care Using Association Rules
Published 2004“…Application of data mining techniques to the World Wide Web referred as Web mining where this term has been used in three distint ways; Web Content Mining, Web Structure Mining and Web Usage Mining. …”
Get full text
Get full text
Get full text
Thesis -
14
Web usage mining for UUM learning care using association rules
Published 2004“…Application of data milling techniques to the World Wide Web referred as Web mining where this term has been used in three distinct ways; Web Content Mining, Web Structure Mining and Web Usage Mining. …”
Get full text
Get full text
Thesis -
15
A modified π rough k-means algorithm for web page recommendation system
Published 2018“…Secondly, the CTI dataset, which has been proven by the existing research work as a more suitable Web server logs in the term of Web page recommendation quality, is used for measuring the performance of the proposed modified algorithm for Web page recommendation system. …”
Get full text
Get full text
Get full text
Thesis -
16
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…This SOA implementation does not possess adequate security solutions within it, and its security is completely dependent on network/transport layer security that is obsolete owing to latest web technologies such as Web 2.0 and its upgraded version, Web 3.0. …”
Get full text
Get full text
Article -
17
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…This SOA implementation does not possess adequate security solutions within it, and its security is completely dependent on network/transport layer security that is obsolete owing to latest web technologies such as Web 2.0 and its upgraded version, Web 3.0. …”
Get full text
Get full text
Article -
18
Implementing RC5 Encrtption Algorithm On a Web Based Medical Cosultation System
Published 2007“…It proposes a cryptography approach using RC5 as fast and strong block cipher encryption algorithm. …”
Get full text
Get full text
Thesis -
19
-
20
Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment
Published 2011“…A Home Application Server (HAS) was configured for proof of concept. …”
Get full text
Get full text
Thesis
