Search Results - (( its application server algorithm ) OR ( _ application model algorithm ))*
Search alternatives:
- application server »
- application model »
- server algorithm »
- model algorithm »
-
1
-
2
Efficient DNS based Load Balancing for Bursty Web Application Traffic
Published 2012“…The proposed algorithm is evaluated via computer simulation and modeling where its performance is verified against the few selected algorithms of the same nature. …”
Get full text
Get full text
Get full text
Article -
3
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
4
-
5
Improving the quality of service of fixed WiMAX networks by decreasing application response time using a distributed model
Published 2022“…A brand new distributed Client-Server model was designed for the fixed WiMAX Network in order to reduce application response time. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Peer to peer trade in HTM5 meta model for agent oriented cloud robotic systems
Published 2015“…These cloud servers treat robots as any other client computer offering them platform, infrastructure, process or algorithm as a service. …”
Get full text
Get full text
Article -
7
Hybridflood algorithms minimizing redundant messages and maximizing efficiency of search in unstructured P2P networks
Published 2012“…However, in a typical client-server network, as a client joins the network it only shares its demands, not its resources. …”
Get full text
Get full text
Thesis -
8
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…Presently, many researches have been made on remote monitoring and its techniques. The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
Get full text
Get full text
Thesis -
9
-
10
-
11
-
12
Energy and performance efficient resource allocation for cloud-based data centers
Published 2015“…It is also a technology revolution, offering flexible IT usage in a cost efficient and pay-per-use manner. Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources such as, networks, servers, storage, applications,and services. …”
Get full text
Get full text
Thesis -
13
Secure lightweight client for cloud-based E-Health Model
Published 2023“…The implementation of the four features is described as follows: Firstly, the SCBEH model, which optimized a MONA benchmark model and absorbed all its security technologies, has four aspects to be considered: 1) the use of symmetric and asymmetric hybrid encryption technique (KEM-DEM), in which the latest elliptic curve cryptography algorithm (ECC) of asymmetric encryption is used; 2) the applications of group key distribution and group signature technologies are achieved; 3) the revocation and tracking of illegal group members are reimplemented; 4) the computational burden of client is alleviated. …”
Get full text
Get full text
Get full text
Thesis -
14
-
15
Detection of SQL injection attack using machine learning
Published 2024“…Integrating this system into the backend of the web application server would augment the safety and security measures of the online application. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Application of Technology Acceptance Model on Database Normalizer
Published 2011“…This study provides a normalization algorithm to perform the 1NF, 2NF, and 3NF automatically based on Microsoft Access and SQL Server databases. …”
Get full text
Get full text
Get full text
Thesis -
17
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
18
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
19
Three-dimensional structure of Human Epididymis Protein 4 (HE4): a protein modelling of an ovarian cancer biomarker through in silico approach
Published 2024“…These three servers em-ployed deep learning algorithms, threading templates, and de novomethods, respec-tively. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Development of a Reliable Multicast Protocol in Mobile Ad Hoc Networks
Published 2008Get full text
Get full text
Thesis
