Search Results - (( developing function using algorithm ) OR ( _ application server algorithm ))

Refine Results
  1. 1

    Locust- inspired meta-heuristic algorithm for optimising cloud computing performance by Fadhil, Mohammed Alaa

    Published 2023
    “…This algorithm can also be used for task scheduling. The proposed algorithm efficiently maps and achieves the objective function for server consolidation, optimising energy consumption, VM migrations, and server utilisation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    A study on one way hashing function and its application for FTMSK webmail / Noor Hasimah Ibrahim Teo by Ibrahim Teo, Noor Hasimah

    Published 2005
    “…A prototype is developed using MD5 algorithm and based on prototype approach, since it study on existing system. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Rangka kerja keselamatan transaksi bagi pelanggan pelayan berasaskan perdagangan elektronik by Abdullah, Abdul Hanan

    Published 2003
    “…Researchers have been developing a system using intrusion detector approach base on differential analysis. …”
    Get full text
    Get full text
    Monograph
  4. 4

    Enhancement load balancing in failover web server by using HTTP-response status techniques with pfsense opensource / Muhammad Hafiz Ramli by Ramli, Muhammad Hafiz

    Published 2020
    “…Besides, notification of the HTTP-response status will be developed for the web server. Next, this paper will discuss the current approach used for web server load balancing to provide high availability system. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A study on one way hashing function and its application for FTMSK webmail / Mohd Rosli Mohd Daud by Mohd Daud, Mohd Rosli

    Published 2007
    “…Prototypes are developed for both MD5 and SHA1 in one way hashing function using evolutionary approach. …”
    Get full text
    Get full text
    Research Reports
  6. 6

    Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Efficient Clustering Method by Hasan, Nurul

    Published 2010
    “…The proposed architecture is more scalable and proposed algorithm is robustness against even/uneven node deployment.…”
    Get full text
    Get full text
    Citation Index Journal
  7. 7

    Parallel algorithms for numerical simulations of EHD ion-drag micropump on distributed parallel computing systems by Shakeel Ahmed, Kamboh

    Published 2014
    “…The designed algorithms are implemented for EHD equations and their performance is evaluated by using different performance indicators. …”
    Get full text
    Get full text
    Thesis
  8. 8

    XML web services / Wong Kok Chuan by Wong, Kok Chuan

    Published 2003
    “…Next is the implementation phase which covers a brief description on the development environment used, explanations on a few algorithms used and the coding techniques and patterns which I followed. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    SELAMAT: a new secure and lightweight multi-factor authentication scheme for cross-platform industrial IoT systems by Khalid, Haqi, Hashim, Shaiful Jahari, Syed Ahmad Abdul Rahman, Sharifah Mumtazah, Hashim, Fazirulhisyam, Chaudhary, Muhammad Akmal

    Published 2021
    “…The proposed scheme extends the Kerberos workflow and utilizes the AES-ECC algorithm for efficient encryption keys management and secure communication between the edge nodes and fog node servers to establish secure mutual authentication. …”
    Get full text
    Get full text
    Article
  11. 11

    Peer to peer trade in HTM5 meta model for agent oriented cloud robotic systems by Nagrath, Vineet, Morel, Olivier, Malik, Aamir Saeed, Mohamad Saad, Mohamad Naufal, Meriaudeau, Fabrice

    Published 2015
    “…These cloud servers treat robots as any other client computer offering them platform, infrastructure, process or algorithm as a service. …”
    Get full text
    Get full text
    Article
  12. 12

    Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil by Shahrul Kamil, Aiman Nurrasyid

    Published 2020
    “…This research proposes some of the blockchain function which is signing and verification process on the BLE (Bluetooth Low Energy) network environment due the security issue on the BLE itself using three different hash algorithm MD5, SHA1 and SHA256. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Application of Technology Acceptance Model on Database Normalizer by Al-Absi, Ahmed Abdulhakim Ahmed

    Published 2011
    “…This study provides a normalization algorithm to perform the 1NF, 2NF, and 3NF automatically based on Microsoft Access and SQL Server databases. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Development and integration of capacitive sensing and electrocuting grid for mosquitoes surveillance and control by Khoo, Brendan Teng Thiam

    Published 2020
    “…The Central Server stores the surveillance data from all the smart traps and hosts web applications for users to monitor and manipulate the system. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Smart student timetable planner by Wong, Xin Tong

    Published 2025
    “…The system is implemented using Node.js with Express for server-side development, HTML, CSS, and JavaScript for the frontend, and Socket.IO for real-time collaboration. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16
  17. 17
  18. 18
  19. 19

    Design and implementation of a private and public key crypto processor for next-generation it security applications by Hani, Mohamed Khalil, Wen, Hau Yuan, Paniandi, Arul

    Published 2006
    “…The operating system frequency is set to 40 MHz. A demonstration application prototype in the form of a real-time secure e-document application has been developed to verify the functionality and validate the embedded system.…”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Adaptive System State Based Load Balancing For Web Application Server Cluster Of Heterogeneous Performance Nodes by Lu, Chin Mei

    Published 2013
    “…This research is to propose a new efficient DNS-based load balancing algorithms that can solve a sudden increase of demand for service requests when they are applied to a local Domain Name Service (DNS) server for Web based applications and selected services. …”
    Get full text
    Get full text
    Thesis