Search Results - (( iot applications out algorithm ) OR ( based application server algorithm ))*
Search alternatives:
- application server »
- based application »
- iot applications »
- applications out »
- server algorithm »
- out algorithm »
-
1
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…These features resulted in faster runtime compared to the more established RS A asymmetric encryption scheme, making AAp a potential alternative for IoT security. At the time of writing this thesis, AAḃ algorithm still exists as a mathematical concept and proven in a mathematical based software. …”
Get full text
Get full text
Thesis -
2
-
3
Adaptive System State Based Load Balancing For Web Application Server Cluster Of Heterogeneous Performance Nodes
Published 2013“…This research is to propose a new efficient DNS-based load balancing algorithms that can solve a sudden increase of demand for service requests when they are applied to a local Domain Name Service (DNS) server for Web based applications and selected services. …”
Get full text
Get full text
Get full text
Thesis -
4
Efficient DNS based Load Balancing for Bursty Web Application Traffic
Published 2012“…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
Get full text
Get full text
Get full text
Article -
5
An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar
Published 2021“…Conventional AR-IoT applications only specialize in the localized area for the on-site application and not applicable for a remote monitoring system. …”
Get full text
Get full text
Thesis -
6
Enhancement load balancing in failover web server by using HTTP-response status techniques with pfsense opensource / Muhammad Hafiz Ramli
Published 2020“…In conclusion, based on the ten (10) scenario, the failure error 404 and 500 occur in ICMP based monitoring, which in the network layer while congestion issue in HTTP based monitoring, which is in the application layer. …”
Get full text
Get full text
Thesis -
7
Locust- inspired meta-heuristic algorithm for optimising cloud computing performance
Published 2023“…This algorithm can also be used for task scheduling. The proposed algorithm efficiently maps and achieves the objective function for server consolidation, optimising energy consumption, VM migrations, and server utilisation. …”
Get full text
Get full text
Thesis -
8
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
Get full text
Get full text
Thesis -
9
-
10
-
11
A wireless interference-aware internet-of-things gateway placement framework with genetic algorithm approach
Published 2022Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
-
13
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…This technique also introduces a multi thread based persistence layer, which supports early binding and parallel connection to the servers. …”
Get full text
Get full text
Thesis -
14
Web cluster load balancing via genetic-fuzzy based algorithm
Published 2007Get full text
Get full text
Get full text
Article -
15
Unimas Vehicles On Road Monitoring And Recognition (Iot System)
Published 2023“…Vehicle monitoring activities are carried out by assessing the intensity of capture data from Canny Edge Detector Algorithm and IR sensors received for summons. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
16
-
17
Chromametric Techniques for IoT, real-time and reliable Food Freshness Measurement
Published 2015Get full text
Get full text
Final Year Project -
18
-
19
Efficient vehicle routing optimization for autistic users / Abdulrahman Hasan Mohammed Shabalah
Published 2020“…Simulation experiments have been conducted using the Unity game engine to analyse the effect of these features on the performance of the overall system. AFAC is designed based on client-server architecture, which includes both the server-side and the client-side parts. …”
Get full text
Get full text
Get full text
Thesis -
20
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Published 2017“…In conclusion, the SHA-3 with smaller area and higher performance has been designed and is possible to cater the needs of IoT application.…”
Get full text
Get full text
Thesis
