Search Results - (( using application server algorithm ) OR ( evolution optimization bat algorithm ))
Search alternatives:
- evolution optimization »
- application server »
- using application »
- server algorithm »
- optimization bat »
- bat algorithm »
-
1
Multi-Swarm bat algorithm
Published 2023“…In this study a new Bat Algorithm (BA) based on multi-swarm technique called the Multi-Swarm Bat Algorithm (MSBA) is proposed to address the problem of premature convergence phenomenon. …”
Article -
2
Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff
Published 2017“…Basically, the QEEA is based on the Time Domain (TD) and Frequency Domain (FD) scheduling where it is dependent on the QoS requirements to allocate resources. The proposed algorithm is compared against other scheduling algorithms, namely, the Channel and QoS Aware (CQA), Priority Set Scheduler (PSS), Proportional Fair (PF), Maximum Throughput (MT) and Blind Average Throughput (BAT). …”
Get full text
Get full text
Thesis -
3
A technique of dispatching algorithms for web-server cluster
Published 2011Get full text
Working Paper -
4
-
5
-
6
Locust- inspired meta-heuristic algorithm for optimising cloud computing performance
Published 2023“…This algorithm can also be used for task scheduling. The proposed algorithm efficiently maps and achieves the objective function for server consolidation, optimising energy consumption, VM migrations, and server utilisation. …”
Get full text
Get full text
Thesis -
7
-
8
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
Get full text
Get full text
Thesis -
9
Mobile application design for protecting the data in cloud using enhanced technique of encryption
Published 2024journal::journal article -
10
-
11
Enhancement load balancing in failover web server by using HTTP-response status techniques with pfsense opensource / Muhammad Hafiz Ramli
Published 2020“…There are few load balancing algorithms available that help load balance works efficiently across multiple servers. …”
Get full text
Get full text
Thesis -
12
-
13
A framework of rough cultural algorithms in optimizing mobile web caching performance
Published 2007“…The common cause of poor performance is due to the direct access to the server (e.g. pitiable performance of server-side applications or during burst crowds) and network infrastructure (e.g. long geographical distances, network overloads, etc.). …”
Get full text
Get full text
Article -
14
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The experimental main server and replication servers were established in Windows and Linux platform using the local area network (LAN). …”
Get full text
Get full text
Thesis -
15
-
16
Soap performance enhancement for high volume messaging / Ali Baba Dauda
Published 2018“…The metrics of the Web services used are the payload overhead, server response time, client response time and compression/decompression overhead. …”
Get full text
Get full text
Get full text
Thesis -
17
A Study Of Salting Method for Image Protection
Published 2013“…This study will review various algorithm to be used in securing the password, including password hashing algorithms MD5 and SHA-1, along with types of commonly used attack for this type of situation. …”
Other -
18
Efficient vehicle routing optimization for autistic users / Abdulrahman Hasan Mohammed Shabalah
Published 2020“…The design and analysis of the comparison have been done using MATLAB tool. The experimental results showed that the performance of the proposed AFAC algorithm outperformed the classical Ant Colony and the recent MPAC algorithms. …”
Get full text
Get full text
Get full text
Thesis -
19
-
20
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…Hashed Message Authentication Code (HMAC) is widely used to provide authenticity, while symmetric encryption algorithms provide confidentiality. …”
Get full text
Get full text
Thesis
