Search Results - (( web application towards algorithm ) OR ( its application server algorithm ))*
Search alternatives:
- application server »
- towards algorithm »
- server algorithm »
- web application »
- its application »
-
1
-
2
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…The recommendation services provided reduce users burden from manual browsing and searching for knowledge reference resources. KSFaci is embedded in web environment and is implemented using Java Servlet and runs under Apache server. …”
Get full text
Get full text
Thesis -
3
Efficient DNS based Load Balancing for Bursty Web Application Traffic
Published 2012“…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
Get full text
Get full text
Get full text
Article -
4
-
5
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
Get full text
Get full text
Thesis -
6
-
7
-
8
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…This technique also introduces a multi thread based persistence layer, which supports early binding and parallel connection to the servers. All the replication servers established its connection through interfaces. …”
Get full text
Get full text
Thesis -
9
-
10
-
11
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…Presently, many researches have been made on remote monitoring and its techniques. The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
Get full text
Get full text
Thesis -
12
-
13
Integrating of web 2.0 technologies for interactive courseware : data structure and algorithm as case study
Published 2013“…Web 2.0 is commonly associated with Web applications that facilitate interactive information sharing, interoperability, user-centred design, and collaboration utilizing of technology. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
14
ScholarsAid: a personalized scholarship web application based on web scraping/ Muhammad Nur Haqeem Sulaiman and Norhasliza Ahmad
Published 2023“…With this web application, students can make more informed decisions and take a step towards achieving their academic goals. …”
Get full text
Get full text
Get full text
Article -
15
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Peer to peer trade in HTM5 meta model for agent oriented cloud robotic systems
Published 2015“…These cloud servers treat robots as any other client computer offering them platform, infrastructure, process or algorithm as a service. …”
Get full text
Get full text
Article -
17
Hybridflood algorithms minimizing redundant messages and maximizing efficiency of search in unstructured P2P networks
Published 2012“…However, in a typical client-server network, as a client joins the network it only shares its demands, not its resources. …”
Get full text
Get full text
Thesis -
18
Improving the quality of service of fixed WiMAX networks by decreasing application response time using a distributed model
Published 2022“…A brand new distributed Client-Server model was designed for the fixed WiMAX Network in order to reduce application response time. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
SELAMAT: a new secure and lightweight multi-factor authentication scheme for cross-platform industrial IoT systems
Published 2021“…Fog users at the network’s edge communicate with many fog servers in different fogs and newly joined servers that they had never contacted before. …”
Get full text
Get full text
Article -
20
