Search Results - (( using server based algorithm ) OR ( java application stemming algorithm ))
Search alternatives:
- application stemming »
- stemming algorithm »
- java application »
- using server »
- server based »
-
1
Enhancing Market-Based Scheduling Algorithm on Globally Distributed Web Servers Using Least Suitable Sealed Bid Technique
Published 2006“…Scheduling of a multiple distributed servers is considered as a complex problem.considered as NP-complete problem,where no single efficient algorithm guaranteed to produce optimal results.This thesis investigates on how to find optimal solution for distribute system,by implementing market based scheduling Algorithm(MBSA).On implementing the MBSA, a new auction technique which is the least suitable sealed bid auction will be introduced.it is found that least suitable sealed bid technique will give the close-to-optimum solution.In the implementation, cooperative agents were used as a middleware between web servers and stand-alone schedulers. …”
Get full text
Get full text
Thesis -
2
Enhancement load balancing in failover web server by using HTTP-response status techniques with pfsense opensource / Muhammad Hafiz Ramli
Published 2020“…There are few load balancing algorithms available that help load balance works efficiently across multiple servers. …”
Get full text
Get full text
Thesis -
3
Locust- inspired meta-heuristic algorithm for optimising cloud computing performance
Published 2023“…This algorithm can also be used for task scheduling. The proposed algorithm efficiently maps and achieves the objective function for server consolidation, optimising energy consumption, VM migrations, and server utilisation. …”
Get full text
Get full text
Thesis -
4
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…This system is achieved using the Genetic Algorithm which is capable of performing information retrieval and learning algorithm. …”
Get full text
Get full text
Thesis -
5
Rangka kerja keselamatan transaksi bagi pelanggan pelayan berasaskan perdagangan elektronik
Published 2003“…Hashing function implementation have been using in this system as its cryptography algorithm. …”
Get full text
Get full text
Monograph -
6
-
7
Web cluster load balancing via genetic-fuzzy based algorithm
Published 2007“…According to the experts’ subjective evaluations, a fuzzy inference system is established to aggregate the fuzzy web performance metrics into a so-called load-weight index which indicates the servers workload intensity. Based on the load-weight index, the genetic-fuzzy algorithm is applied to equally redistribute the workload among in the servers. …”
Get full text
Get full text
Get full text
Article -
8
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The experimental main server and replication servers were established in Windows and Linux platform using the local area network (LAN). …”
Get full text
Get full text
Thesis -
9
Service based load balance mechanism using software-defined networks / Ahmed Abdelaziz Abdelltif Osman
Published 2017“…To address aforementioned problems, we proposed a service based load balance (SBLB) mechanism using Software-Defined Networks (SDN). …”
Get full text
Get full text
Get full text
Thesis -
10
An improved dynamic load balancing for virtualmachines in cloud computing using hybrid bat and bee colony algorithms
Published 2021“…The proposed HBAC algorithm was tested and compared with other stateof-the-art algorithms on 200 to 2000 even tasks by using CloudSim on standard workload format (SWF) data sets file size (200kb and 400kb). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Continuous media (CM) data stream in flash-based solid state disk (SSD) storage server
Published 2019Get full text
Get full text
Conference or Workshop Item -
12
Comparison and evaluation of multiple sequence alignment tools in bininformatics
Published 2009“…A novel method was proposed for qualifying the MSA tools result by using Scorecons server to compute the conservation scores which was named SCS method (ScoreCons Server method). …”
Get full text
Article -
13
Objects tracking from natural features in mobile augmented reality
Published 2013“…Markerless (direct real object tracking) systems use client-server architecture. However, these are affected by network latency. …”
Get full text
Get full text
Get full text
Article -
14
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…Based on the performance simulations, the new parallel algorithm gained speedup of 1.74 with 85% efficiency over the current sequential algorithm. …”
Get full text
Get full text
Thesis -
15
Efficient vehicle routing optimization for autistic users / Abdulrahman Hasan Mohammed Shabalah
Published 2020“…AFAC is designed based on client-server architecture, which includes both the server-side and the client-side parts. …”
Get full text
Get full text
Get full text
Thesis -
16
Developing Bus Tracking System that predicts the arrival times of public buses at Universiti Teknologi PETRONAS (UTP) bus stops.
Published 2004“…The scope of the project includes developing an algorithm, the research and analysis of GPS and the use of SMS. …”
Get full text
Get full text
Final Year Project -
17
Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Efficient Clustering Method
Published 2010“…We introduce a modified cluster based model by using special nodes called server nodes (SN) that is powerful in term of resources. …”
Get full text
Get full text
Citation Index Journal -
18
Outdoor marker-less tracking and pose calculating system for mobile augmented reality
Published 2014“…This thesis also proposes an algorithm for pose estimation using homography and investigates the use of static database in smart-phones so as to bypass the need of a desktop server. …”
Get full text
Get full text
Thesis -
19
A comparative analysis of task scheduling algorithms of virtual machines in cloud environment
Published 2023“…The evaluation of these algorithms is based on three metrics: Total power consumption, DC load and VM load. …”
Article -
20
Improving the security and encryption performance of cloud storage by using elliptic curve cryptography
Published 2016“…In this thesis, we have proposed a security solution based on an ECC algorithm to improve the security and the performance of the data by dividing the file content and encrypting it on both the server and the client side. …”
Get full text
Get full text
Thesis
