Search Results - (( data application server algorithm ) OR ( data equalization based algorithm ))

Refine Results
  1. 1

    Secure policies for the distributed virtual machines in mobile cloud computing by Annane, Boubakeur

    Published 2020
    “…Furthermore, an algorithm that enables secure communication among distributed VMs and protection of sensitive data in VMs on the cloud is proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Secure Access To Authorized Resources Based On Fingerprint Authentication by Elmadani, Ahmed Baba

    Published 2003
    “…The A VL tree is used to increase the compression ratio as its compression algorithm works efficiently for all types of data. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5
  6. 6

    A Novel Artificial Intelligence Based Timing Synchronization Scheme for Smart Grid Applications by Mohammad Kamrul, Hasan, Musse Mohamud, Ahmed, Aisha, Hassan Abdalla Hashim, Abdur Razzaque, Shayla Islam, Biswajeet, Pandey

    Published 2020
    “…Time-efficient communication systems should have the ability to function in severe propagation conditions in smart grid applications. The data/packet communications need to be maintained by synchronized timing and reliability through equally considering the signal deterioration occurrences, which are propagation delay, phase errors and channel conditions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Load balancing and server consolidation in cloud computing environments: a meta-study by Fadhil, Mohammed Alaa, Othman, Mohamed

    Published 2019
    “…Load balancing with server consolidation enriches the exploitation of resource utilization and can enhance Quality of Service (QoS) metrics, since data-centers and their applications are increasing exponentially. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Data pre-processing on web server logs for generalized association rules mining algorithm by Abd Wahab, Mohd Helmy, Mohd, Mohd Norzali, Hanafi, Hafizul Fahri, Mohamad Mohsin, Mohamad Farhan

    Published 2008
    “…Since the pre-processing is tedious process, it depending on the algorithm and purposes of the applications.…”
    Get full text
    Get full text
    Article
  10. 10

    Locust- inspired meta-heuristic algorithm for optimising cloud computing performance by Fadhil, Mohammed Alaa

    Published 2023
    “…The cloud paradigm has arisen due to a rapid growth in applications and data sizes. Even though cloud computing servers and resources may seem unlimited, this is not true, as increased server usage leads to increased energy consumption and carbon emissions. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun by Kok , Sun Sun

    Published 2000
    “…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A novel artificial intelligence based timing synchronization scheme for smart grid applications by Hasan, Mohammad Kamrul, Ahmed, Musse Mohamud, Hassan Abdalla Hashim, Aisha, Razzaque, Abdur, Islam, Shayla, Pandey, Bishwajeet

    Published 2020
    “…Time-efficient communication systems should have the ability to function in severe propagation conditions in smart grid applications. The data/packet communications need to be maintained by synchronized timing and reliability through equally considering the signal deterioration occurrences, which are propagation delay, phase errors and channel conditions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…It can improve the performance and the reliability of a database application. In addition, it can be considered as a data backup method in case of hardware failure, software corruption or even a natural disaster. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18

    Reduced rank technique for joint channel estimation and joint data detection in TD-SCDMA systems by Marzook, Ali Kamil, Ismail, Alyani, Mohd Ali, Borhanuddin, Sali, Aduwati, Khalaf, Mohannad H., Khatun, Sabira

    Published 2013
    “…The detectors: zero forcing block linear equalizer and minimum mean square error block linear equalizer algorithms are considered in this paper to recover the data. …”
    Get full text
    Get full text
    Article
  19. 19

    Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm by Mohammed Alaidaros, Hashem

    Published 2007
    “…The server calculates the MAC of the data the same time the encryption processes the data. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Reduced Rank Technique for Joint Channel Estimation and Joint Data Detection in TD-SCDMA Systems by Sabira, Khatun, Ali K., Marzook, Alyani, Ismail, Aduwati, Sali, Mohannad Hamed, Khalaf, Borhan, M. Ali

    Published 2012
    “…The detectors: zero forcing block linear equalizer and minimum mean square error block linear equalizer algorithms are considered in this paper to recover the data. …”
    Get full text
    Get full text
    Article