Search Results - (( data application server algorithm ) OR ( data virtualization path algorithm ))
Search alternatives:
- data virtualization »
- virtualization path »
- application server »
- data application »
- server algorithm »
- path algorithm »
-
1
A technique of dispatching algorithms for web-server cluster
Published 2011Get full text
Working Paper -
2
-
3
Mobile application design for protecting the data in cloud using enhanced technique of encryption
Published 2024journal::journal article -
4
Load balancing and server consolidation in cloud computing environments: a meta-study
Published 2019“…Load balancing with server consolidation enriches the exploitation of resource utilization and can enhance Quality of Service (QoS) metrics, since data-centers and their applications are increasing exponentially. …”
Get full text
Get full text
Get full text
Article -
5
Data pre-processing on web server logs for generalized association rules mining algorithm
Published 2008“…Since the pre-processing is tedious process, it depending on the algorithm and purposes of the applications.…”
Get full text
Get full text
Article -
6
Locust- inspired meta-heuristic algorithm for optimising cloud computing performance
Published 2023“…The cloud paradigm has arisen due to a rapid growth in applications and data sizes. Even though cloud computing servers and resources may seem unlimited, this is not true, as increased server usage leads to increased energy consumption and carbon emissions. …”
Get full text
Get full text
Thesis -
7
-
8
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
Get full text
Get full text
Thesis -
9
Sistem navigasi berasaskan algoritma Dijkstra di dalam persekitaran tiga dimensi
Published 2008“…Therefore, it is the aim of this study to conduct a research about the Dijsktra’s algorithm implementation for shortest path calculation in 3D environment. …”
Get full text
Get full text
Get full text
Thesis -
10
A new routing mechanism for energy-efficient in bluetooth mesh-low power nodes based on wireless sensor network
Published 2023“…The multi-criterion energyefficient routing mechanism uses the ACO algorithm, inspired by ants' foraging behaviour. In Bluetooth M-LPNWSN systems, virtual ants explore paths based on signal robustness, distances, and energy consumption. …”
Get full text
Get full text
Get full text
Thesis -
11
On protecting data storage in mobile cloud computing paradigm
Published 2014Get full text
Get full text
Get full text
Article -
12
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…It can improve the performance and the reliability of a database application. In addition, it can be considered as a data backup method in case of hardware failure, software corruption or even a natural disaster. …”
Get full text
Get full text
Thesis -
13
Smart grid: Bio-inspired algorithms energy distributions for data centers
Published 2025Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
-
15
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…The server calculates the MAC of the data the same time the encryption processes the data. …”
Get full text
Get full text
Thesis -
16
A framework of rough cultural algorithms in optimizing mobile web caching performance
Published 2007“…The common cause of poor performance is due to the direct access to the server (e.g. pitiable performance of server-side applications or during burst crowds) and network infrastructure (e.g. long geographical distances, network overloads, etc.). …”
Get full text
Get full text
Article -
17
Improving response time, availability and reliability through asynchronous replication technique in cluster architecture of web server cluster
Published 2010Get full text
Get full text
Conference or Workshop Item -
18
Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase
Published 2007Get full text
Get full text
Conference or Workshop Item -
19
-
20
Design and implementation of MD5 hash function algorithm using verilog HDL
Published 2022“…The architecture includes MD5 padding block, data path, and a controller. A general concept and implementation of the MD5 hash function is described. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
