Search Results - (( its application server algorithm ) OR ( its application use algorithm ))

Refine Results
  1. 1
  2. 2

    Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun by Kok , Sun Sun

    Published 2000
    “…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges by Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni

    Published 2014
    “…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6
  7. 7

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The new replication process will also be used in e-commerce application to secure user transaction information. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10
  11. 11

    Performance evaluation of task scheduling using hybrid meta-heuristic in heterogeneous cloud environment by A. Saif, Faten, Derahman, Mohd Noor, Alwan, Ali Amer, Latip, Rohaya

    Published 2019
    “…It is an essential role of cloud computing to enable sharing of resources on-demand over the network including servers, applications, storage, services, and database to the end-users who are remotely connected to the network. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider by Omer Fadlelmola Elkhider, Samih

    Published 2011
    “…Presently, many researches have been made on remote monitoring and its techniques. The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Performance evaluation of task scheduling using hybrid meta-heuristic in heterogeneous cloud environment by Mohammed, Faten Ameen Saif, Derahman, Mohd Noor, Alwan, Ali Amer, Latip, Rohaya

    Published 2019
    “…It is an essential role of cloud computing to enable sharing of resources on-demand over the network including servers, applications, storage, services, and database to the end-users who are remotely connected to the network. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin by Amiruddin, Amir Herman

    Published 2014
    “…Popularity of P2P applications usage; majorly on file-sharing and video streaming has gained vast popularity and so rapid which wake up network service providers of its dominance. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Energy and performance efficient resource allocation for cloud-based data centers by Akhter, Nasrin

    Published 2015
    “…It is also a technology revolution, offering flexible IT usage in a cost efficient and pay-per-use manner. Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources such as, networks, servers, storage, applications,and services. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Peer to peer trade in HTM5 meta model for agent oriented cloud robotic systems by Nagrath, Vineet, Morel, Olivier, Malik, Aamir Saeed, Mohamad Saad, Mohamad Naufal, Meriaudeau, Fabrice

    Published 2015
    “…These cloud servers treat robots as any other client computer offering them platform, infrastructure, process or algorithm as a service. …”
    Get full text
    Get full text
    Article
  19. 19

    Improving the quality of service of fixed WiMAX networks by decreasing application response time using a distributed model by Lawal, Ibrahim A., Ibrahim, Adamu Abubakar, Zammarah, Nuha Abdullah

    Published 2022
    “…A brand new distributed Client-Server model was designed for the fixed WiMAX Network in order to reduce application response time. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…In this modern era of enterprise computing, the enterprise application integration (EAI) is a well-known industry-recognized architectural principle that is built based on loosely coupled application architecture, where service-oriented architecture (SOA) is the architectural pattern for the implementation of EAI, whose computational elements are called as â��services.â�� Though SOA can be implemented in a wide range of technologies, the web services implementation of SOA becomes the current selective choice due to its simplicity that works on basic Internet protocols. …”
    Get full text
    Get full text
    Article