Search Results - (( messaging application server algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    Soap performance enhancement for high volume messaging / Ali Baba Dauda by Ali Baba , Dauda

    Published 2018
    “…Two messages formats, normal and compressed (modified algorithm) with the size ranging 1MB - 22 MB were generated and executed 50 times in both web services. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4

    Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm by Mohammed Alaidaros, Hashem

    Published 2007
    “…Hashed Message Authentication Code (HMAC) is widely used to provide authenticity, while symmetric encryption algorithms provide confidentiality. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Employing Public Key Infrastructure to Encapsulate Messages During Transport Layer Security Handshake Procedure by Nayeem Ahmad, Khan, Adnan Shahid, Khan, Seleviawati, Tarmizi, Azlina, Ahmadi Julaihi, Zeeshan, Ahmad

    Published 2022
    “…When communicating between client and server, these algorithms address challenges like confidentiality, integrity, availability, and non-repudiation. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  6. 6
  7. 7

    Hybridflood algorithms minimizing redundant messages and maximizing efficiency of search in unstructured P2P networks by Barjini, Hassan

    Published 2012
    “…Thus, the proposed algorithms enhance the performance of the search by reducing redundant messages, increasing the success rate and decreasing latency. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10

    Performance analysis of Message Passing Interface collective communication on intel xeon quad-core gigabit ethernet and infiniband clusters by Ismail, Roswan, Abdul Hamid, Nor Asilah Wati, Othman, Mohamed, Latip, Rohaya

    Published 2013
    “…However, InfiniBand provides the lowest latency for all operations since it provides applications with an easy to use messaging service, compared to Gigabit Ethernet, which still requests the operating system for access to one of the server communication resources with the complex dance between an application and a network. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12
  13. 13
  14. 14

    An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan by Syed Adnan, Syed Farid

    Published 2019
    “…It is also not known how the algorithm would perform against the widely used RSA on resource-constrained platforms. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Data hiding mobile application by using encryption and decryption / Nuha Bakizah Mohd Asri by Mohd Asri, Nuha Bakizah

    Published 2021
    “…Encode is mainly achieved by changing the message into other code that any third-party will not understand, one with the database of the user and one with the database of the server. …”
    Get full text
    Get full text
    Student Project
  16. 16

    Monitoring cathodic protection system for underground pipeline by Thai, Seng Choong

    Published 2013
    “…The local server uses push emails and short message service (SMS) to alert to the user whenever there is a malfunction detected. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19
  20. 20