Search Results - (( java implementation during algorithm ) OR ( process application server algorithm ))
Search alternatives:
- implementation during »
- java implementation »
- process application »
- application server »
- during algorithm »
- server algorithm »
-
1
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
2
Data pre-processing on web server logs for generalized association rules mining algorithm
Published 2008“…Since the pre-processing is tedious process, it depending on the algorithm and purposes of the applications.…”
Get full text
Get full text
Article -
3
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
4
Adaptive System State Based Load Balancing For Web Application Server Cluster Of Heterogeneous Performance Nodes
Published 2013“…This research is to propose a new efficient DNS-based load balancing algorithms that can solve a sudden increase of demand for service requests when they are applied to a local Domain Name Service (DNS) server for Web based applications and selected services. …”
Get full text
Get full text
Get full text
Thesis -
5
Soap performance enhancement for high volume messaging / Ali Baba Dauda
Published 2018“…Therefore, reducing the response time and overhead will enhance the communication process. To achieve this aim, LZ77 compression algorithm is modified to encode more symbols. …”
Get full text
Get full text
Get full text
Thesis -
6
-
7
A framework of rough cultural algorithms in optimizing mobile web caching performance
Published 2007“…The common cause of poor performance is due to the direct access to the server (e.g. pitiable performance of server-side applications or during burst crowds) and network infrastructure (e.g. long geographical distances, network overloads, etc.). …”
Get full text
Get full text
Article -
8
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
Get full text
Get full text
Thesis -
9
Mobile application design for protecting the data in cloud using enhanced technique of encryption
Published 2024journal::journal article -
10
Enhancement load balancing in failover web server by using HTTP-response status techniques with pfsense opensource / Muhammad Hafiz Ramli
Published 2020“…There are few load balancing algorithms available that help load balance works efficiently across multiple servers. …”
Get full text
Get full text
Thesis -
11
Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase
Published 2007Get full text
Get full text
Conference or Workshop Item -
12
-
13
-
14
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
15
-
16
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…The server calculates the MAC of the data the same time the encryption processes the data. …”
Get full text
Get full text
Thesis -
17
-
18
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
Get full text
Get full text
Thesis -
19
Employing Public Key Infrastructure to Encapsulate Messages During Transport Layer Security Handshake Procedure
Published 2022“…When communicating between client and server, these algorithms address challenges like confidentiality, integrity, availability, and non-repudiation. …”
Get full text
Get full text
Get full text
Proceeding -
20
