Search Results - (( development evaluation server algorithm ) OR ( java application stemming algorithm ))
Search alternatives:
- development evaluation »
- application stemming »
- stemming algorithm »
- evaluation server »
- server algorithm »
- java application »
-
1
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…So, the objective for this paper is to evaluate the results in the benchmark paper and to evaluate the implementation of LACE algorithm in a huge number of servers within one cloud datacenter. …”
Get full text
Get full text
Thesis -
2
Locust- inspired meta-heuristic algorithm for optimising cloud computing performance
Published 2023“…The proposed algorithm is evaluated using the WorkflowSim simulation with a real dataset. …”
Get full text
Get full text
Thesis -
3
Enhancement load balancing in failover web server by using HTTP-response status techniques with pfsense opensource / Muhammad Hafiz Ramli
Published 2020“…There are few load balancing algorithms available that help load balance works efficiently across multiple servers. …”
Get full text
Get full text
Thesis -
4
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The purpose of this project are to construct and provide guidelines to develop a simulation model to evaluate cryptography algorithm in terms of encryption speed and descryption speed on UUM portal. …”
Get full text
Get full text
Get full text
Thesis -
5
Evaluation of structured questions using modified BLEU algorithm
Published 2016“…This paper describes and exemplifies an application of a Structured Exam Questions Test Bank and Evaluation Using Modified Bilingual Evaluation Understudy (BLEU) Algorithm, a software system developed in pursuit of robust computerized marking of free-text answers to open-ended questions.It employs the Information System Development Research Methodology with modified BLEU Algorithm and Expert System for similar words.The system was developed to facilitate in managing and administrating structured questions for client/server architecture based on intranet. …”
Get full text
Get full text
Get full text
Article -
6
Evaluation of arima and ann stream analytics for air quality monitoring system
Published 2021“…The data stored in the query table act as input to the analytics algorithm, which runs in R-server as well. In this thesis, two algorithms have been implemented and compared. …”
Get full text
Get full text
Thesis -
7
Outdoor marker-less tracking and pose calculating system for mobile augmented reality
Published 2014“…Experiments and many evaluations are conducted to validate the proposed algorithms on iPhone. …”
Get full text
Get full text
Thesis -
8
Energy-efficient algorithms for dynamic virtual machine consolidation in cloud data centers
Published 2017“…Cloud computing has evolved with the development of large-scale data centers, including thousands of servers around the world. …”
Get full text
Get full text
Get full text
Article -
9
Natural disaster mitigation system with an IoT based TTGO T-Call V1.3 ESP32 wireless module microcontroller / Muhammad Fareez Asyraf Istas Fahrurrazi
Published 2024“…The methodology entails gathering sensor data, evaluating it with a decision-making algorithm, triggering alarms, activating output devices, and transmitting data to the server via HTTP protocols. …”
Get full text
Get full text
Student Project -
10
-
11
Parallel algorithms for numerical simulations of EHD ion-drag micropump on distributed parallel computing systems
Published 2014“…The parallel computing laboratory is configured for homogeneous systems using MATLAB Distributed Computing Server (MDCS) with Windows 7 operating system. The designed algorithms are implemented for EHD equations and their performance is evaluated by using different performance indicators. …”
Get full text
Get full text
Thesis -
12
Multi-source data fusion framework for remote triaging and prioritization in telemedicine
Published 2015“…As telemedicine consists of three tiers (Sensors/ sources, Base station and Server), the simulation of the proposed frameworks as fusion algorithm in the base station and as healthcare services algorithm in the server was demonstrated. …”
Get full text
Get full text
Thesis -
13
A fault-intrusion-tolerant system and deadline-aware algorithm for scheduling scientific workflow in the cloud
Published 2021“…Background: Recent technological developments have enabled the execution of more scientific solutions on cloud platforms. …”
Get full text
Get full text
Article -
14
BCLH2Pro: a novel computational tools approach for hydrogen production prediction via machine learning in biomass chemical looping processes
Published 2024“…The algorithm has been developed into a user-friendly tool, BCLH2Pro, accessible via a web server. …”
Get full text
Get full text
Get full text
Article -
15
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…Subsequently, an experimental evaluation of the proposed Multi-Filter Feature Selection (M2FS) method is performed by using the benchmark dataset, NSL-KDD and employed the J48 classification algorithm. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Passenger Counting With Face Detection
Published 2020“…The outcome can be visualized on different type of devices for further analysis through a central cloud server. The performance of the passenger counting system is evaluated in terms of accuracy and frame per second (FPS). …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Effectiveness of mobile agent for query retrieval
Published 2002“…This paper discusses the limitations of current software tools to search in the Internet and proposes a new approach by employing a mobile agent to retrieve the query results in the local search servers. The Mobile Agent Search System (MaSS) has been developed to reduce the time for searching and retrieving information from the Internet. …”
Get full text
Get full text
Get full text
Article -
18
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
Published 2024“…XSS-DETREM has been evaluated empirically using a data set of JSP and Android web applications that have been used in previous studies. …”
Get full text
Get full text
Get full text
Thesis -
19
Enhanced 3D terrain visualization process using game engine
Published 2018“…The study adopts design research process that is comprised of problem identification from literature review, solution development by using the process to develop the prototype needed, and evaluation by comparing the output of the visualization process. …”
Get full text
Get full text
Get full text
Thesis -
20
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…This thesis seeks to study the AAḃ design philosophy and the specifications of the AAḃ asymmetric encryption scheme, develop the AAḃ encryption scheme and evaluate the computational speed, power consumption and feasibility of AAḃ encryption scheme on an embedded system in the practical domain. …”
Get full text
Get full text
Thesis
