Search Results - (( some applications a algorithm ) OR ( _ application server algorithm ))*
Search alternatives:
- application server »
- some applications »
- server algorithm »
- applications a »
- a algorithm »
-
1
Load balancing and server consolidation in cloud computing environments: a meta-study
Published 2019“…Therefore, this paper surveys published load balancing algorithms that achieved by server consolidation via a meta-analysis. …”
Get full text
Get full text
Get full text
Article -
2
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Enhancement load balancing in failover web server by using HTTP-response status techniques with pfsense opensource / Muhammad Hafiz Ramli
Published 2020“…There are few load balancing algorithms available that help load balance works efficiently across multiple servers. …”
Get full text
Get full text
Thesis -
4
School teacher-subject allocation management system
Published 2024“…This project will build STSAMS as a web-based application in React.js that is equipped with API server, database, and the allotment algorithm with the Scrum methodology. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
-
6
Features selection for IDS in encrypted traffic using genetic algorithm
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
7
-
8
Features selection for ids in encrypted traffic using genetic algorithm
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
9
A new WDM Application Response Time in WLAN Network and Fixed WiMAX using Distributed
Published 2014“…The simulation results obtained for the application response time of the proposed Client-Server model show an improvement in network performance. …”
Get full text
Get full text
Conference or Workshop Item -
10
Intelligent Web caching using neurocomputing and particle swarm optimization algorithm
Published 2008Get full text
Get full text
Get full text
Conference or Workshop Item -
11
-
12
A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim
Published 2017“…A prototype of the proposed architecture was built and validated which the focus is towards determining the decision algorithm precision and measuring the video assimilation. …”
Get full text
Get full text
Thesis -
13
Home intruder detection system using machine learning and IoT
Published 2022“…The main objectives of HIDES are to create a reliable home security system with the implementation of IoT, to implement the object detection algorithm to determine the presence of humans, and to develop a smart mobile application for users to monitor their houses from anywhere in the world and be alerted if any threats are detected. …”
Get full text
Get full text
Get full text
Article -
14
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…However, in BLE 4.2 environment, encryption algorithms are only applied between BLE devices and gateway thus leaving the network to be vulnerable on the public side of the BLE network which is between the gateway and the server. …”
Get full text
Get full text
Thesis -
15
FPGA-enabled binarised convolutional neural networks toward real-time embedded object recognition system
Published 2017“…To overcome these difficulties, we propose an embedded object recognition system implemented with a binarised CNN and an FPGA. FPGAs consist of a matrix of reconfigurable logic gates allowing parallel computing which befits most image processing algorithms such as the CNN. …”
Get full text
Get full text
Conference or Workshop Item -
16
A technique of dispatching algorithms for web-server cluster
Published 2011Get full text
Working Paper -
17
Performance analysis of voice codec for VoIP
Published 2008Get full text
Get full text
Get full text
Thesis -
18
-
19
-
20
Locust- inspired meta-heuristic algorithm for optimising cloud computing performance
Published 2023“…This algorithm can also be used for task scheduling. The proposed algorithm efficiently maps and achieves the objective function for server consolidation, optimising energy consumption, VM migrations, and server utilisation. …”
Get full text
Get full text
Thesis
