Soap performance enhancement for high volume messaging / Ali Baba Dauda
The emergence of high-volume data exchange like business-to-business and computational sciences that are mission critical and always persist over time have exacted distributed systems and applications to be fast. SOAP is one of the best protocols using XML to exchange message but the XML is too verb...
| Main Author: | Ali Baba , Dauda |
|---|---|
| Format: | Thesis |
| Published: |
2018
|
| Subjects: | |
| Online Access: | http://studentsrepo.um.edu.my/11315/ http://studentsrepo.um.edu.my/11315/1/Ali_Baba.pdf http://studentsrepo.um.edu.my/11315/2/Ali_Baba.pdf |
Similar Items
Blind signature / Musfirah Mohd Ali
by: Musfirah, Mohd Ali
Published: (2005)
by: Musfirah, Mohd Ali
Published: (2005)
Implementation of hashed cryptography algorithm based on cryptography message syntax
by: Ali, Mohammed Ahnaf
Published: (2019)
by: Ali, Mohammed Ahnaf
Published: (2019)
Online nota kuliah / Shah Rizal Othman Ali
by: Shah Rizal, Othman Ali
Published: (2003)
by: Shah Rizal, Othman Ali
Published: (2003)
Analisis suara: Rekabentuk penjana kod unik / Aslizawani Ali
by: Aslizawani, Ali
Published: (2004)
by: Aslizawani, Ali
Published: (2004)
Web application for Malaysia Footbal League / Ery Idzwan Ali
by: Ery Idzwan , Ali
Published: (2004)
by: Ery Idzwan , Ali
Published: (2004)
Sistem inventori Kolej Kediaman Tun Ahmad Zaidi / Ayuniza Ali
by: Ayuniza , Ali
Published: (2001)
by: Ayuniza , Ali
Published: (2001)
Message system with J2EE and Ajax technology (Table of contents and abstract only)
by: Su , Seong Lin
Published: (2007)
by: Su , Seong Lin
Published: (2007)
SMS applications: Short Messaging & Result Checking System (SMRCS) / Lau Sook Wai
by: Lau , Sook Wai
Published: (2003)
by: Lau , Sook Wai
Published: (2003)
Kaji selidik permainan komputer secara online / Wan Rohaya Wan Ali
by: Wan Rohaya , Wan Ali
Published: (2004)
by: Wan Rohaya , Wan Ali
Published: (2004)
Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed
by: Aneesa Ali, Ali Saeed
Published: (2017)
by: Aneesa Ali, Ali Saeed
Published: (2017)
Automated intruder detection from image sequences using minimum volume sets
by: Ahmed, Tarem, et al.
Published: (2012)
by: Ahmed, Tarem, et al.
Published: (2012)
The evolving fuzzy clustering approach for discriminating neutron and gamma-ray pulses / Ali Seyed Shirkhorshidi
by: Ali Seyed , Shirkhorshidi
Published: (2020)
by: Ali Seyed , Shirkhorshidi
Published: (2020)
Unsupervised monocular depth estimation with multi-scale structural similarity powered loss function / Ali Kohan
by: Ali, Kohan
Published: (2020)
by: Ali, Kohan
Published: (2020)
Accelerating data retrieval using index prioritization approach / Shatha Ali Mohammed Al-Ashwal
by: Shatha Ali , Mohammed Al-Ashwal
Published: (2019)
by: Shatha Ali , Mohammed Al-Ashwal
Published: (2019)
Mr image volume segmentation using neuro-fuzzy method / Ahmad Safwan Mohamed Makki
by: Ahmad Safwan, Mohamed Makki
Published: (2003)
by: Ahmad Safwan, Mohamed Makki
Published: (2003)
Softrisk : prototype for software risk management / Ayad Ali Kashlaf.
by: Kashlaf, Ayad Ali
Published: (1999)
by: Kashlaf, Ayad Ali
Published: (1999)
Sistem maklumat pengurusan pelajar luar kampus SMPLK versi 1.0 / Syed Abd Halim Syed Ali
by: Syed Abd Halim , Syed Ali
Published: (2002)
by: Syed Abd Halim , Syed Ali
Published: (2002)
A malware analysis and detection system for mobile devices / Ali Feizollah
by: Ali, Feizollah
Published: (2017)
by: Ali, Feizollah
Published: (2017)
A secure message handler using microsoft cryptoapi
by: Eh Kan, Chessda Uttraphan
Published: (2003)
by: Eh Kan, Chessda Uttraphan
Published: (2003)
Human avatar in virtual environment / Shaiful Baharie Mohd Ali
by: Shaiful Baharie, Mohd Ali
Published: (2004)
by: Shaiful Baharie, Mohd Ali
Published: (2004)
Unified framework for spam detection and risk assessment in short message communication media / Adewole Kayode Sakariyah
by: Adewole Kayode, Sakariyah
Published: (2018)
by: Adewole Kayode, Sakariyah
Published: (2018)
An Efficient Safety System For Vanet Using Enhanced Message Dissemination Protocols With Channel Performance Control
by: Samara, Ghassan Abedalkarim Abdullah
Published: (2012)
by: Samara, Ghassan Abedalkarim Abdullah
Published: (2012)
Retrieval of human facial images based on visual content and semantic description / Ahmed Abdu Ali Alattab
by: Alattab, Ahmed Abdu Ali
Published: (2013)
by: Alattab, Ahmed Abdu Ali
Published: (2013)
Mobile geo-based bulletin messaging system
by: Lee, Bernard Jian Wen
Published: (2018)
by: Lee, Bernard Jian Wen
Published: (2018)
Algorithm for enhancing the QoS of video traffic over wireless mesh networks
by: A. Moh, Abdul Nasser, et al.
Published: (2019)
by: A. Moh, Abdul Nasser, et al.
Published: (2019)
An enhanced group mobility management method in wireless body area networks
by: Mohamed Abdullah, Radhwan, et al.
Published: (2019)
by: Mohamed Abdullah, Radhwan, et al.
Published: (2019)
A study of caesar cipher and transposition cipher in jawi messages
by: Mohd Lokman, Syiham, et al.
Published: (2018)
by: Mohd Lokman, Syiham, et al.
Published: (2018)
Modifications In Turbo Coding System For Performance Enhancement
by: Balakrishnan, Bala Murali Thara
Published: (2005)
by: Balakrishnan, Bala Murali Thara
Published: (2005)
An adaptive user interface model for enhancing usability and performance efficiency of diabetes mobile applications / Chew Sook Peng
by: Chew , Sook Peng
Published: (2022)
by: Chew , Sook Peng
Published: (2022)
Design and Study for the Algorithm of Multimedia Messaging Service (MMS) Framework in Message Delivery
by: Setyono, Andik, et al.
Published: (2009)
by: Setyono, Andik, et al.
Published: (2009)
Video scene change detection based on histogram analysis for hiding message
by: M., Fuad, et al.
Published: (2021)
by: M., Fuad, et al.
Published: (2021)
High-Performance CMOS Clock And Data Recovery Circuit
by: Tan, Kok Siang
Published: (2006)
by: Tan, Kok Siang
Published: (2006)
Enhancement of multicast network security
by: Ali, Sellami, et al.
Published: (2013)
by: Ali, Sellami, et al.
Published: (2013)
Utilizing modular neural network for prediction of possible
emergencies locations within point of interest of Hajj pilgrimage
by: Abubakar, Adamu, et al.
Published: (2016)
by: Abubakar, Adamu, et al.
Published: (2016)
Enhancing user authentication for cloud web-based application / Detar Beqo
by: Detar , Beqo
Published: (2018)
by: Detar , Beqo
Published: (2018)
Automated intrusion prevention mechanism in enhancing network security / He Xiao Dong
by: He , Xiao Dong
Published: (2008)
by: He , Xiao Dong
Published: (2008)
High performance visualization of human tumor growth software
by: Alias, Norma, et al.
Published: (2008)
by: Alias, Norma, et al.
Published: (2008)
Enhancing Classification Algorithms with Metaheuristic Technique
by: Cokro, Nurwinto, et al.
Published: (2024)
by: Cokro, Nurwinto, et al.
Published: (2024)
Messaging application / Yew Hooi Phaik
by: Yew, Hooi Phaik
Published: (2001)
by: Yew, Hooi Phaik
Published: (2001)
Adaptive delay tolerant routing for enhanced connectivity in vehicular networks / Mostofa Kamal Nasir
by: Mostofa Kamal , Nasir
Published: (2016)
by: Mostofa Kamal , Nasir
Published: (2016)
Similar Items
-
Blind signature / Musfirah Mohd Ali
by: Musfirah, Mohd Ali
Published: (2005) -
Implementation of hashed cryptography algorithm based on cryptography message syntax
by: Ali, Mohammed Ahnaf
Published: (2019) -
Online nota kuliah / Shah Rizal Othman Ali
by: Shah Rizal, Othman Ali
Published: (2003) -
Analisis suara: Rekabentuk penjana kod unik / Aslizawani Ali
by: Aslizawani, Ali
Published: (2004) -
Web application for Malaysia Footbal League / Ery Idzwan Ali
by: Ery Idzwan , Ali
Published: (2004)