Search Results - (( internet application server algorithm ) OR ( java data visualization algorithm ))
Search alternatives:
- internet application »
- application server »
- data visualization »
- server algorithm »
- java »
-
1
-
2
-
3
-
4
-
5
A framework of rough cultural algorithms in optimizing mobile web caching performance
Published 2007“…The common cause of poor performance is due to the direct access to the server (e.g. pitiable performance of server-side applications or during burst crowds) and network infrastructure (e.g. long geographical distances, network overloads, etc.). …”
Get full text
Get full text
Article -
6
Server scanning worm detection by using intelligent failure connection algorithm
Published 2024Article -
7
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…Advanced Encryption Standard (AES) was chosen as encryption algorithm and HMAC Standard Hash Algorithm 1 (SHA1) was chosen as HMAC algorithm. …”
Get full text
Get full text
Thesis -
8
Enhanced bibliographic data retrieval and visualization using query optimization and spectral centrality measure
Published 2019“…This study proposing an enhance bibliographic data retrieval and visualization using hybrid clustering method consists of K-harmonic mean (KHM) and Spectral Algorithm and eigenvector centrality measure. …”
Get full text
Get full text
Get full text
Article -
9
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
Get full text
Get full text
Thesis -
10
A Study Of Salting Method for Image Protection
Published 2013“…This paper describes the study on benefit and importance of the implementation of Salting Method for protection of images stored in an online server database. This type of security method is implemented on the password that will be used to gain access to images stored in an online server, and after implemented supposedly the data will be secured and cannot be compromised by internet intruders or also known as hackers. …”
Other -
11
Dynamic force-directed graph with weighted nodes for scholar network visualization
Published 2022“…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
Get full text
Get full text
Article -
12
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006“…Computer A will be sent the data to computer B through the internet/LAN using JAVA program. …”
Get full text
Get full text
Monograph -
13
Implementing server-side federated learning in an edge-cloud framework for precision aquaculture
Published 2025Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
-
15
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Implementing RC5 Encrtption Algorithm On a Web Based Medical Cosultation System
Published 2007“…This project is a web based application for medical consultation system, it describes a special security way to process a medical care data which transporting through a public networks such as the Internet. …”
Get full text
Get full text
Thesis -
17
A new WDM Application Response Time in WLAN Network and Fixed WiMAX using Distributed
Published 2014“…The simulation results obtained for the application response time of the proposed Client-Server model show an improvement in network performance. …”
Get full text
Get full text
Conference or Workshop Item -
18
Effectiveness of mobile agent for query retrieval
Published 2002Get full text
Get full text
Get full text
Article -
19
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
20
