Search Results - (( based application server algorithm ) OR ( its applications using algorithmic ))*
Search alternatives:
- application server »
- applications using »
- based application »
- server algorithm »
- its applications »
- algorithmic »
-
1
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
Get full text
Get full text
Thesis -
2
-
3
-
4
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The new replication process will also be used in e-commerce application to secure user transaction information. …”
Get full text
Get full text
Thesis -
5
-
6
-
7
-
8
-
9
Energy and performance efficient resource allocation for cloud-based data centers
Published 2015“…The objective is to develop the quality of service constraints by the under workload for reducing energy consumption and to improve the application of computing resources. Dynamic VM consolidation leverages fine grained fluctuations in the application workloads, and continuously reallocates VMs using live migration to minimize the number of active physical nodes. …”
Get full text
Get full text
Thesis -
10
Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment
Published 2011“…A Home Application Server (HAS) was configured for proof of concept. …”
Get full text
Get full text
Thesis -
11
Peer to peer trade in HTM5 meta model for agent oriented cloud robotic systems
Published 2015“…These cloud servers treat robots as any other client computer offering them platform, infrastructure, process or algorithm as a service. …”
Get full text
Get full text
Article -
12
Improving the quality of service of fixed WiMAX networks by decreasing application response time using a distributed model
Published 2022“…The performance of the network was increased by the deployment of more Base Stations (BSs), Subscriber Stations, and the utilization of client-server Base Stations that were chosen by the Nearest Neighborhood Algorithm that was devised…”
Get full text
Get full text
Get full text
Get full text
Article -
13
Secure lightweight client for cloud-based E-Health Model
Published 2023“…Thirdly, an authorization algorithm named federated proxy implements for fine-grained access control based on CP-ABE (FPI-CP-ABE) is proposed. …”
Get full text
Get full text
Get full text
Thesis -
14
-
15
An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin
Published 2014“…Using a novel firewall framework designed in this dissertation, an algorithm adapted from research by Yan, Wu, Luo, & Zhang (2013) was used for the P2P identification method. …”
Get full text
Get full text
Thesis -
16
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
17
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
18
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…It is also not known how the algorithm would perform against the widely used RSA on resource-constrained platforms. …”
Get full text
Get full text
Thesis -
19
-
20
Application of Technology Acceptance Model on Database Normalizer
Published 2011“…This study provides a normalization algorithm to perform the 1NF, 2NF, and 3NF automatically based on Microsoft Access and SQL Server databases. …”
Get full text
Get full text
Get full text
Thesis
