Search Results - (( some application server algorithm ) OR ( _ application system algorithm ))*

Refine Results
  1. 1

    School teacher-subject allocation management system by Yap, Dennis Jian Yuan

    Published 2024
    “…This project will build STSAMS as a web-based application in React.js that is equipped with API server, database, and the allotment algorithm with the Scrum methodology. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2

    Load balancing and server consolidation in cloud computing environments: a meta-study by Fadhil, Mohammed Alaa, Othman, Mohamed

    Published 2019
    “…Therefore, this paper surveys published load balancing algorithms that achieved by server consolidation via a meta-analysis. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges by Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni

    Published 2014
    “…Some studies have also shown the efficiency of RSA algorithm in securing remote login sessions, and electronic credit-card payment systems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Enhancement load balancing in failover web server by using HTTP-response status techniques with pfsense opensource / Muhammad Hafiz Ramli by Ramli, Muhammad Hafiz

    Published 2020
    “…There are few load balancing algorithms available that help load balance works efficiently across multiple servers. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7

    Home intruder detection system using machine learning and IoT by Sahlan, Fadhluddin, Feizal, Faeez Zimam, Mansor, Hafizah

    Published 2022
    “…Home Intruder Detection System (HIDES) is an Internet of Things (IoT) system with a mobile application to help homeowners in house surveillance by alerting users for any potential threats remotely. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim by Ibrahim, Mohd Faisal

    Published 2017
    “…Second, network aware applications architecture for E-Learning system was also proposed to dynamically adjust the users' demand based on network resources. …”
    Get full text
    Get full text
    Thesis
  9. 9

    FPGA-enabled binarised convolutional neural networks toward real-time embedded object recognition system by Shuto, Daisuke, Abbas, Z., Sulaiman, N., Tamukoh, H.

    Published 2017
    “…While the demand rises for robots with robust object recognition implemented with Neural Networks, a trade-off between data processing rate and power consumption persists. Some applications utilise GPGPU (General Purpose computing on Graphics Processing Units), which results in high power consumption thus undesirable for embedded systems, while the others communicate with cloud computers to minimise computational resources at the clients’ side, i.e. robots, raising another concern that the robots are unable to perform object recognition without the servers and network connections. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…For this purpose, we develop an autonomous system that learns from double-bounce emails collected at a mail server. …”
    Get full text
    Get full text
    Thesis
  12. 12

    A new WDM Application Response Time in WLAN Network and Fixed WiMAX using Distributed by Nisar, K., Lawal, I.A., Abualsaud, K., El-Fouly, T.M.

    Published 2014
    “…The simulation results obtained for the application response time of the proposed Client-Server model show an improvement in network performance. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18

    Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil by Shahrul Kamil, Aiman Nurrasyid

    Published 2020
    “…However, in BLE 4.2 environment, encryption algorithms are only applied between BLE devices and gateway thus leaving the network to be vulnerable on the public side of the BLE network which is between the gateway and the server. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20