Search Results - (( developing effective server algorithm ) OR ( java application stemming algorithm ))
Search alternatives:
- application stemming »
- stemming algorithm »
- effective server »
- server algorithm »
- java application »
-
1
Early detection for server availability in University Malaya data center / Mohd Azizi Osman
Published 2016“…The objective of the system is to design the detection algorithm for server availability, to develop the detection algorithm for server availability and to test the detection algorithm form server availability. …”
Get full text
Get full text
Thesis -
2
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
3
Locust- inspired meta-heuristic algorithm for optimising cloud computing performance
Published 2023“…The third part addresses the limitations of LACE algorithms, leading to the proposition of a novel meta-heuristic algorithm called the Locust-Inspired Algorithm (LIA) that can effectively map virtual machines (VMs) for efficient server consolidation. …”
Get full text
Get full text
Thesis -
4
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The motivation of implementation is to make sure the data replication is easy to maintain and cost effective. The PLSR architecture model, workflow and algorithms are described. …”
Get full text
Get full text
Thesis -
5
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…To improve secure of data in cloud storage by hybrid three algorithms (AES, ECC and RSA).All the existing algorithms has some sort of problems and issues, this had made us decide to develop a safe, correct ad efficient algorithm for having secured data in cloud storage. …”
Get full text
Get full text
Get full text
Thesis -
6
Comparison on queuing performance measures on customer’s flow using Queuing Theory Model and DSW Algorithm / Muhammad Izuanudin Azmi, Muhamad Aiman Zulhaikal Azizul and Nurul Aisya...
Published 2022“…Servers at service counters use a queuing system all over the world. …”
Get full text
Get full text
Student Project -
7
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was mainly developing using java programming. Apache Tom cat was used as a server in order to run the application smoothly. …”
Get full text
Get full text
Thesis -
8
Development of graphical interface software for solar flare monitoring system
Published 2023“…Therefore, UKM-SID™ system, with portable kit equipped with an interactive software to produce an easy-to-understand figure, was proposed. An algorithm was also developed to transfer the observed data onto the server in near real time. …”
Get full text
Get full text
Get full text
Article -
9
Peer to peer trade in HTM5 meta model for agent oriented cloud robotic systems
Published 2015“…These cloud servers treat robots as any other client computer offering them platform, infrastructure, process or algorithm as a service. …”
Get full text
Get full text
Article -
10
INDOOR LOCATION SENSING USING WLAN
Published 2007“…The purpose of this project was to produce an indoor location system using WLAN IEEE 802.11b in Access Point (AP) infrastructure setup without additional external hardware. The system was developed in MATLAB platform that comprises of location sensing algorithm (Nearest Neighbor), signal strength database, client-server interface and graphical user interface (GUI). …”
Get full text
Get full text
Final Year Project -
11
Development and integration of capacitive sensing and electrocuting grid for mosquitoes surveillance and control
Published 2020“…The Central Server stores the surveillance data from all the smart traps and hosts web applications for users to monitor and manipulate the system. …”
Get full text
Get full text
Get full text
Thesis -
12
Big Data Mining Using K-Means and DBSCAN Clustering Techniques
Published 2022“…The density-based spatial clustering of applications with noise (DBSCAN) and the K-means algorithm were used to develop clustering algorithms. …”
Get full text
Get full text
Article -
13
-
14
A Framework for Green Energy Resources Identification and Integration Supported by Real-Time Monitoring, Control, and Automation Applications
Published 2025“…Experimental results confirmed the effectiveness of the proposed methodologies. In conclusion, the proposed methodologies demonstrate the potential to overcome barriers to green energy implementation, fostering sustainable development in Sarawak. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
16
Detection of SQL injection attack using machine learning
Published 2024“…Integrating this system into the backend of the web application server would augment the safety and security measures of the online application. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
A fault-intrusion-tolerant system and deadline-aware algorithm for scheduling scientific workflow in the cloud
Published 2021“…Background: Recent technological developments have enabled the execution of more scientific solutions on cloud platforms. …”
Get full text
Get full text
Article -
18
Effectiveness of mobile agent for query retrieval
Published 2002Get full text
Get full text
Get full text
Article -
19
ON CAMPUS IOT DEMONSTRATION FOR STUDENT HOTSPOT TRACKING USING WIRELESS SENSORS NETWORK AND INTEGRATED SOFTWARE PLATEFORM
Published 2017“…IoT offer a more effective solution to record, manage, process and sharing of information via internet. …”
Get full text
Get full text
Final Year Project -
20
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…The behavioural differences between the two have to be developed after understanding their individual properties. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
