Search Results - (( web application service algorithm ) OR ( _ application server algorithm ))*

Refine Results
  1. 1

    Efficient DNS based Load Balancing for Bursty Web Application Traffic by Chin, Mei Lu, Chong, Eng Tan, Mohamad Imran, Bin Bandan

    Published 2012
    “…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Adaptive System State Based Load Balancing For Web Application Server Cluster Of Heterogeneous Performance Nodes by Lu, Chin Mei

    Published 2013
    “…This research is to propose a new efficient DNS-based load balancing algorithms that can solve a sudden increase of demand for service requests when they are applied to a local Domain Name Service (DNS) server for Web based applications and selected services. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Soap performance enhancement for high volume messaging / Ali Baba Dauda by Ali Baba , Dauda

    Published 2018
    “…To achieve this aim, LZ77 compression algorithm is modified to encode more symbols. The algorithm is then integrated into two Web services with HTTP and JMS bindings. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…Web service technology defines several supporting protocols and specifications such as SOAP and WSDL for communication with client and server for data interchange. …”
    Get full text
    Get full text
    Article
  8. 8

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…Web service technology defines several supporting protocols and specifications such as SOAP and WSDL for communication with client and server for data interchange. …”
    Get full text
    Get full text
    Article
  9. 9
  10. 10
  11. 11

    Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges by Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni

    Published 2014
    “…Prior research studies have shown that RSA algorithm is very successful in protecting enterprises commercial services and systems as well as web servers and browsers to secure web traffic. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms by Hydara, Isatou

    Published 2024
    “…Cross-site scripting (XSS) vulnerabilities are a major security threat for both desktop and mobile web applications. They occur due to lack of proper verification of the user inputs, which enables hackers to inject and execute malicious scripts in the web pages of an application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15

    Detection of SQL injection attack using machine learning by Tung, Tean Thong

    Published 2024
    “…Integrating this system into the backend of the web application server would augment the safety and security measures of the online application. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    Employing Public Key Infrastructure to Encapsulate Messages During Transport Layer Security Handshake Procedure by Nayeem Ahmad, Khan, Adnan Shahid, Khan, Seleviawati, Tarmizi, Azlina, Ahmadi Julaihi, Zeeshan, Ahmad

    Published 2022
    “…When communicating between client and server, these algorithms address challenges like confidentiality, integrity, availability, and non-repudiation. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  17. 17

    A survey on QoS requirements based on particle swarm optimization scheduling techniques for workflow scheduling in cloud computing by Ramadhan, Mazen Farid Ebrahim, Latip, Rohaya, Hussin, Masnida, Abdul Hamid, Nor Asilah Wati

    Published 2020
    “…This is aimed at assisting users to decide on the most suitable QoS consideration for large workflows in infrastructure as a service (IaaS) cloud applications and mapping tasks to resources. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim by Ibrahim, Mohd Faisal

    Published 2017
    “…In order to achieve this objective, two architectures introduced in the first and second parts of the thesis were combined to provide the user with the best possible content based on the device capabilities, server and network condition. A prototype of the proposed architecture was built and validated which the focus is towards determining the decision algorithm precision and measuring the video assimilation. …”
    Get full text
    Get full text
    Thesis
  19. 19

    QoS based admission control using multipath scheduler for IP over satellite networks by Audah, Lukman, Sun, Zhili, Cruickshank, Haitham

    Published 2017
    “…The algorithm exploits the multipath routing paradigm over LEO and GEO satellites constellation in order to achieve optimum end-to-end QoS of the client-server Internet architecture for HTTP web service, file transfer, video streaming and VoIP applications. …”
    Get full text
    Get full text
    Article
  20. 20