Search Results - (( its application server algorithm ) OR ( wave application matching algorithm ))*
Search alternatives:
- application matching »
- application server »
- server algorithm »
- wave application »
- its application »
-
1
-
2
-
3
-
4
Efficient DNS based Load Balancing for Bursty Web Application Traffic
Published 2012“…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
Get full text
Get full text
Get full text
Article -
5
-
6
-
7
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
Get full text
Get full text
Thesis -
8
MSS-TCP: a congestion control algorithm for boosting TCP performance in mmwave cellular networks
Published 2025“…The increasing demand for high-speed, low-latency applications, especially with 5G mmWave technology, has led to challenges in TCP performance due to signal blockages, small buffers, and high Packet Error Rates (PERs). …”
Get full text
Get full text
Get full text
Article -
9
Iterative And Single-Step Solutions Of Two Dimensional Time-Domain Inverse Scattering Problem Featuring Ultra Wide Band Sensors
Published 2010“…First, the algorithms‘ performances were evaluated using numerical simulation employing two different scanning geometries: limited and full view scanning geometries, where the applicability of these algorithms was accessed by comparing the reconstructed images with actual model. …”
Get full text
Get full text
Thesis -
10
-
11
Development of Graphical User Interface (GUI) for Antenna Design
Published 2016Get full text
Get full text
Final Year Project -
12
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…This technique also introduces a multi thread based persistence layer, which supports early binding and parallel connection to the servers. All the replication servers established its connection through interfaces. …”
Get full text
Get full text
Thesis -
13
Person identification in irregular cardiac conditions using electrocardiogram signals
Published 2011Get full text
Get full text
Get full text
Proceeding Paper -
14
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…Presently, many researches have been made on remote monitoring and its techniques. The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
Get full text
Get full text
Thesis -
15
-
16
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Peer to peer trade in HTM5 meta model for agent oriented cloud robotic systems
Published 2015“…These cloud servers treat robots as any other client computer offering them platform, infrastructure, process or algorithm as a service. …”
Get full text
Get full text
Article -
18
Hybridflood algorithms minimizing redundant messages and maximizing efficiency of search in unstructured P2P networks
Published 2012“…However, in a typical client-server network, as a client joins the network it only shares its demands, not its resources. …”
Get full text
Get full text
Thesis -
19
Improving the quality of service of fixed WiMAX networks by decreasing application response time using a distributed model
Published 2022“…A brand new distributed Client-Server model was designed for the fixed WiMAX Network in order to reduce application response time. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
SELAMAT: a new secure and lightweight multi-factor authentication scheme for cross-platform industrial IoT systems
Published 2021“…Fog users at the network’s edge communicate with many fog servers in different fogs and newly joined servers that they had never contacted before. …”
Get full text
Get full text
Article
