Search Results - (( data application server algorithm ) OR ( data normalization based algorithm ))
Search alternatives:
- normalization based »
- application server »
- data normalization »
- data application »
- server algorithm »
-
1
Rangka kerja keselamatan transaksi bagi pelanggan pelayan berasaskan perdagangan elektronik
Published 2003“…Hashing function implementation have been using in this system as its cryptography algorithm. In authorised data security on client and server research, researcher mainly focused on data intrusions that can occur anytime without users awareness. …”
Get full text
Get full text
Monograph -
2
Multi-source data fusion framework for remote triaging and prioritization in telemedicine
Published 2015“…As telemedicine consists of three tiers (Sensors/ sources, Base station and Server), the simulation of the proposed frameworks as fusion algorithm in the base station and as healthcare services algorithm in the server was demonstrated. …”
Get full text
Get full text
Thesis -
3
A study on one way hashing function and its application for FTMSK webmail / Noor Hasimah Ibrahim Teo
Published 2005“…Password is a normal way for securing data from intruders. The widespread use of password is in email account. …”
Get full text
Get full text
Thesis -
4
Magnetic resonance imaging sense reconstruction system using FPGA / Muhammad Faisal Siddiqui
Published 2016“…This thesis aimed to investigate and develop a novel parameterized architecture design for SENSE algorithm. The proposed design is implemented on Field Programmable Gate Arrays (FPGAs) platform, which can provide real-time SENSE reconstruction right on the receiver coil data acquisition system with no need to transfer data to the MRI server. …”
Get full text
Get full text
Get full text
Thesis -
5
Development of priority oriented scheduling method to increase the efficiency and reliability for automotive job
Published 2012“…To fulfill this target, first and foremost, the normalize method should be performed. This method allows data (time stamp, time action,priority) of jobs on different scales to be compared by bringing those to a common scale. …”
Get full text
Get full text
Thesis -
6
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…In Chapter 2, we propose a new algorithm based on incremental Radial Basis Function Network (RBFN) to accelerate the learning in stream data. …”
Get full text
Get full text
Thesis -
7
A technique of dispatching algorithms for web-server cluster
Published 2011Get full text
Working Paper -
8
-
9
Mobile application design for protecting the data in cloud using enhanced technique of encryption
Published 2024journal::journal article -
10
Load balancing and server consolidation in cloud computing environments: a meta-study
Published 2019“…Load balancing with server consolidation enriches the exploitation of resource utilization and can enhance Quality of Service (QoS) metrics, since data-centers and their applications are increasing exponentially. …”
Get full text
Get full text
Get full text
Article -
11
Data pre-processing on web server logs for generalized association rules mining algorithm
Published 2008“…Since the pre-processing is tedious process, it depending on the algorithm and purposes of the applications.…”
Get full text
Get full text
Article -
12
Locust- inspired meta-heuristic algorithm for optimising cloud computing performance
Published 2023“…The cloud paradigm has arisen due to a rapid growth in applications and data sizes. Even though cloud computing servers and resources may seem unlimited, this is not true, as increased server usage leads to increased energy consumption and carbon emissions. …”
Get full text
Get full text
Thesis -
13
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
Get full text
Get full text
Thesis -
14
On protecting data storage in mobile cloud computing paradigm
Published 2014Get full text
Get full text
Get full text
Article -
15
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
16
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…It can improve the performance and the reliability of a database application. In addition, it can be considered as a data backup method in case of hardware failure, software corruption or even a natural disaster. …”
Get full text
Get full text
Thesis -
17
Smart grid: Bio-inspired algorithms energy distributions for data centers
Published 2025Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
-
19
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…The server calculates the MAC of the data the same time the encryption processes the data. …”
Get full text
Get full text
Thesis -
20
A framework of rough cultural algorithms in optimizing mobile web caching performance
Published 2007“…The common cause of poor performance is due to the direct access to the server (e.g. pitiable performance of server-side applications or during burst crowds) and network infrastructure (e.g. long geographical distances, network overloads, etc.). …”
Get full text
Get full text
Article
