Search Results - (( _ applications using algorithm ) OR ( some applications server algorithm ))*

Refine Results
  1. 1

    Enhancement load balancing in failover web server by using HTTP-response status techniques with pfsense opensource / Muhammad Hafiz Ramli by Ramli, Muhammad Hafiz

    Published 2020
    “…There are few load balancing algorithms available that help load balance works efficiently across multiple servers. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges by Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni

    Published 2014
    “…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    School teacher-subject allocation management system by Yap, Dennis Jian Yuan

    Published 2024
    “…This project will build STSAMS as a web-based application in React.js that is equipped with API server, database, and the allotment algorithm with the Scrum methodology. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8

    A new WDM Application Response Time in WLAN Network and Fixed WiMAX using Distributed by Nisar, K., Lawal, I.A., Abualsaud, K., El-Fouly, T.M.

    Published 2014
    “…The new distributed Client-Server model was simulated in OPNET modeler 16.0 with multiple Base Stations (BSs), Subscribers Stations (SSs) and some Server BSs selected by the Nearest Neighborhood Algorithms using Orthogonal Frequency Division Multiplexing (OFDM) techniques and compared with the existing Centralized model using Frequency Division Multiplexing (FDM) techniques. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10
  11. 11

    Home intruder detection system using machine learning and IoT by Sahlan, Fadhluddin, Feizal, Faeez Zimam, Mansor, Hafizah

    Published 2022
    “…The main objectives of HIDES are to create a reliable home security system with the implementation of IoT, to implement the object detection algorithm to determine the presence of humans, and to develop a smart mobile application for users to monitor their houses from anywhere in the world and be alerted if any threats are detected. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim by Ibrahim, Mohd Faisal

    Published 2017
    “…For this to happen, applications need to have some mechanism that can estimate the network bandwidth by simply adjusting their behavior based on the collected network characteristics information. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil by Shahrul Kamil, Aiman Nurrasyid

    Published 2020
    “…This research proposes some of the blockchain function which is signing and verification process on the BLE (Bluetooth Low Energy) network environment due the security issue on the BLE itself using three different hash algorithm MD5, SHA1 and SHA256. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Load balancing and server consolidation in cloud computing environments: a meta-study by Fadhil, Mohammed Alaa, Othman, Mohamed

    Published 2019
    “…Therefore, this paper surveys published load balancing algorithms that achieved by server consolidation via a meta-analysis. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16
  17. 17

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…Thus, the users are able to make a phone call, send messages using variety of application such as Whatsapp and Line, send email, serving websites, accessing maps and handling some daily tasks via online using online banking, online shopping and online meetings via video conferences. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    FPGA-enabled binarised convolutional neural networks toward real-time embedded object recognition system by Shuto, Daisuke, Abbas, Z., Sulaiman, N., Tamukoh, H.

    Published 2017
    “…While the demand rises for robots with robust object recognition implemented with Neural Networks, a trade-off between data processing rate and power consumption persists. Some applications utilise GPGPU (General Purpose computing on Graphics Processing Units), which results in high power consumption thus undesirable for embedded systems, while the others communicate with cloud computers to minimise computational resources at the clients’ side, i.e. robots, raising another concern that the robots are unable to perform object recognition without the servers and network connections. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20