Search Results - (( _ application server algorithm ) OR ( based application learning algorithm ))*
Search alternatives:
- application learning »
- application server »
- learning algorithm »
- based application »
- server algorithm »
-
1
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…This system is achieved using the Genetic Algorithm which is capable of performing information retrieval and learning algorithm. …”
Get full text
Get full text
Thesis -
2
Automatic email classification system / Phang Siew Ting
Published 2003Get full text
Get full text
Thesis -
3
Web Usage Mining for UUM Learning Care Using Association Rules
Published 2004“…E-Learning is one of the Web based application where it will facing with large amount of data. …”
Get full text
Get full text
Get full text
Thesis -
4
Intelligent cooperative web caching policies for media objects based on decision tree supervised machine learning algorithm
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Web usage mining for UUM learning care using association rules
Published 2004“…E-Leaming is one of the Web based application where it will facing with large amount of data. …”
Get full text
Get full text
Thesis -
6
A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim
Published 2017“…Second, network aware applications architecture for E-Learning system was also proposed to dynamically adjust the users' demand based on network resources. …”
Get full text
Get full text
Thesis -
7
Implementing server-side federated learning in an edge-cloud framework for precision aquaculture
Published 2025Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Deep reinforcement learning online offloading for SWIPT multiple access edge computing network
Published 2021“…In this paper, a SWIPT-based MEC system is proposed, comprising a multi-antenna access point (AP), multiple single antenna low power IoT devices and a MEC server. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
9
Mobility-aware Offloading Decision For Multi-access Edge Computing In 5g Networks
Published 2024journal::journal article -
10
Detection of SQL injection attack using machine learning
Published 2024“…Integrating this system into the backend of the web application server would augment the safety and security measures of the online application. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
-
12
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…The proposed security architecture is constructed as an adaptive way-forward Internet-of-Things (IoT) friendly security solution that is comprised of three cyclic parts: learn, predict and prevent. A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
13
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…The proposed security architecture is constructed as an adaptive way-forward Internet-of-Things (IoT) friendly security solution that is comprised of three cyclic parts: learn, predict and prevent. A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
14
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
Get full text
Get full text
Get full text
Article -
15
Determination of suitable resource discovery tool and methodology for high-volume internet of things (IoT)
Published 2021“…Q-learning is one of the successful techniques available for the exploration of IoT nodes, but context based problems have already been established and simplified as issues of dedicated server management, IoT object data acquisition issues, and unique application requirements. …”
Get full text
Get full text
Conference or Workshop Item -
16
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
17
-
18
Q-Learning-based detection of IPv6 intrusions: a behavioral and performance study
Published 2025Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
SnapShare: AI Trained Mobile App to Share Snaps Automatically
Published 2020“…This study proposes a SnapShare mobile application that uses Face Recognition Algorithms to classify individuals in the photos and automatically shares photos with recognized individuals. …”
Get full text
Get full text
Get full text
Article -
20
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…In Chapter 2, we propose a new algorithm based on incremental Radial Basis Function Network (RBFN) to accelerate the learning in stream data. …”
Get full text
Get full text
Thesis
