Search Results - (( developing function a algorithm ) OR ( based application server algorithm ))
Search alternatives:
- developing function »
- application server »
- based application »
- server algorithm »
- a algorithm »
- function a »
-
1
Locust- inspired meta-heuristic algorithm for optimising cloud computing performance
Published 2023“…This algorithm can also be used for task scheduling. The proposed algorithm efficiently maps and achieves the objective function for server consolidation, optimising energy consumption, VM migrations, and server utilisation. …”
Get full text
Get full text
Thesis -
2
Enhancement load balancing in failover web server by using HTTP-response status techniques with pfsense opensource / Muhammad Hafiz Ramli
Published 2020“…networking. The primary function of a load balancing is to distribute user requests or network traffic load efficiently across multiple servers or a cluster of servers, which it guarantees high availability and reliability by sending the workload only to servers that are ready and online. …”
Get full text
Get full text
Thesis -
3
Rangka kerja keselamatan transaksi bagi pelanggan pelayan berasaskan perdagangan elektronik
Published 2003“…Researchers have been developing a system using intrusion detector approach base on differential analysis. …”
Get full text
Get full text
Monograph -
4
A study on one way hashing function and its application for FTMSK webmail / Noor Hasimah Ibrahim Teo
Published 2005“…A prototype is developed using MD5 algorithm and based on prototype approach, since it study on existing system. …”
Get full text
Get full text
Thesis -
5
Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Efficient Clustering Method
Published 2010“…Once the aggregator node becomes non functional, it affects the whole cluster. We introduce a candidate cluster head node on the basis of node density. …”
Get full text
Get full text
Citation Index Journal -
6
Parallel algorithms for numerical simulations of EHD ion-drag micropump on distributed parallel computing systems
Published 2014“…The DPA-EHD is further modified by utilizing the pipelining parallelism to reduce the computing iterations and named as data parallel and pipelining algorithm (DPPA-EHD). To implement the parallel algorithms a distributed parallel computing laboratory using easily available low cost computers is setup. …”
Get full text
Get full text
Thesis -
7
Peer to peer trade in HTM5 meta model for agent oriented cloud robotic systems
Published 2015“…These cloud servers treat robots as any other client computer offering them platform, infrastructure, process or algorithm as a service. …”
Get full text
Get full text
Article -
8
Systematic literature review: Trend analysis on the design of lightweight block cipher
Published 2024journal::journal article -
9
Application of Technology Acceptance Model on Database Normalizer
Published 2011“…This study provides a normalization algorithm to perform the 1NF, 2NF, and 3NF automatically based on Microsoft Access and SQL Server databases. …”
Get full text
Get full text
Get full text
Thesis -
10
Development and integration of capacitive sensing and electrocuting grid for mosquitoes surveillance and control
Published 2020“…The final proposed system is tested with a basic species recognition algorithm and achieved species recognition rate of between 75% to 83% and selective trapping rate of between 63% to 69%.…”
Get full text
Get full text
Get full text
Thesis -
11
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…However, in BLE 4.2 environment, encryption algorithms are only applied between BLE devices and gateway thus leaving the network to be vulnerable on the public side of the BLE network which is between the gateway and the server. …”
Get full text
Get full text
Thesis -
12
-
13
Smart student timetable planner
Published 2025“…Course data is managed in CSV format, parsed into JSON for fast processing, while sessionStorage and localStorage handle user data within active sessions. A Genetic Algorithm forms the core scheduling engine, generating optimized timetables that respect both hard constraints, such as avoiding clashes, and soft constraints, such as personal preferences.The final output of this project is a functional web-based timetable planner that successfully enhances scheduling efficiency, reduces the likelihood of errors, and improves the overall academic planning experience. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Adaptive System State Based Load Balancing For Web Application Server Cluster Of Heterogeneous Performance Nodes
Published 2013“…This research is to propose a new efficient DNS-based load balancing algorithms that can solve a sudden increase of demand for service requests when they are applied to a local Domain Name Service (DNS) server for Web based applications and selected services. …”
Get full text
Get full text
Get full text
Thesis -
15
Development of a smart sensing unit for LoRaWAN-based IoT flood monitoring and warning system in catchment areas
Published 2023“…We developed a new algorithm to measure and monitor flood levels and rate changes effectively. …”
Get full text
Get full text
Get full text
Article -
16
Development of a smart sensing unit for LoRaWAN-based IoT flood monitoring and warning system in catchment areas
Published 2023“…We developed a new algorithm to measure and monitor flood levels and rate changes effectively. …”
Get full text
Get full text
Get full text
Article -
17
Efficient DNS based Load Balancing for Bursty Web Application Traffic
Published 2012“…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
Get full text
Get full text
Get full text
Article -
18
Security framework based multi agent system architecture to facilitate data fetching from cloud data storage
Published 2012“…This research is carried out in five steps of a Secure System Development Life Cycle (SecSDLC) utilized as a research methodology. …”
Get full text
Get full text
Thesis -
19
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
Get full text
Get full text
Thesis -
20
Smart energy meter based on a long-range wide-area network for a stand-alone photovoltaic system
Published 2022“…The AllThingsTalkMaker IoT server is integrated into the TTN to be accessed using Web/mobile application interfaces. …”
Get full text
Get full text
Get full text
Article
