Search Results - (( _ application server algorithm ) OR ( based application testing algorithms ))*

Refine Results
  1. 1

    Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun by Kok , Sun Sun

    Published 2000
    “…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Locust- inspired meta-heuristic algorithm for optimising cloud computing performance by Fadhil, Mohammed Alaa

    Published 2023
    “…This algorithm can also be used for task scheduling. The proposed algorithm efficiently maps and achieves the objective function for server consolidation, optimising energy consumption, VM migrations, and server utilisation. …”
    Get full text
    Get full text
    Thesis
  3. 3

    An optimal tasks scheduling algorithm based on QoS in cloud computing network by Alhakimi, Mohammed Ameen Mohammed Abdo

    Published 2017
    “…These resources contain storage, servers, and other applications and it provides security, flexibility, and sealability. …”
    Get full text
    Get full text
    Thesis
  4. 4

    School teacher-subject allocation management system by Yap, Dennis Jian Yuan

    Published 2024
    “…This project will build STSAMS as a web-based application in React.js that is equipped with API server, database, and the allotment algorithm with the Scrum methodology. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    Web based applications for energy management system incorporated network reconfiguration using genetic algorithm / Wan Adnan Wan by Wan Chik, Wan Adnan

    Published 2006
    “…This research was involved with the development of Web Based Applications for Energy Management System for providing Web application system, Web monitoring System and Genetic algorithm Based Network Reconfiguration Technique for loss minimization in the UiTM Distribution System. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Objects tracking from natural features in mobile augmented reality by Ng, Edmund Giap Weng, Rehman, Ullah Khan, Shahren, Ahmad Zaidi Adruce, Oon, Yin Bee

    Published 2013
    “…The pose matrix from extracted features was calculated by Homography. The adapted algorithm was tested in a mobile AR-prototype application using iPhone. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Evaluation of structured questions using modified BLEU algorithm by Siraj, Fadzilah, Ali, Mohamed Salem

    Published 2016
    “…This paper describes and exemplifies an application of a Structured Exam Questions Test Bank and Evaluation Using Modified Bilingual Evaluation Understudy (BLEU) Algorithm, a software system developed in pursuit of robust computerized marking of free-text answers to open-ended questions.It employs the Information System Development Research Methodology with modified BLEU Algorithm and Expert System for similar words.The system was developed to facilitate in managing and administrating structured questions for client/server architecture based on intranet. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Developing a prototype e-commerce application with credit card validation and secure transaction by M. A., Ameedeen

    Published 2005
    “…The application also includes an online credit card validation module that validates credit cards against the Luhn Algorithm and predefined credit card prefixes.The application will accept three types of credit cards which are Mastercard,Visa and American Express.The application is developed on the NET platform using ASP.NET and Visual Basic NET scripting.Therefore,the application could run on all kinds of platform.The application requires a Microsoft Server based operating system and Microsoft SQL Server in order for it to run.The application has been tested and runs successfully both on a server and on a workstation with server settings.In short,this system is the solution to the problems of current e-commerce technology.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  12. 12
  13. 13
  14. 14
  15. 15

    Development of a Web Access Control Technique Based User Access Behavior by Abdelrahman, Selmaelsheikh

    Published 2004
    “…The necessary steps for the proposed technique are identified, and algorithms of these steps are developed and implemented using Active Server Page (ASP) and then tested on two web pages. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18

    An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin by Amiruddin, Amir Herman

    Published 2014
    “…The experiment showed that, for P2P identification ability, Netflow based algorithm detected 28.7% more than DPI. Further investigation clearly showed it was because DPI failed to detect encrypted P2P hosts compared to DPI. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Detection of SQL injection attack using machine learning by Tung, Tean Thong

    Published 2024
    “…The system covers multiple stages: project pre-development, data pre-processing, feature selection, machine learning model selection, model training, model testing, implementation, and assessment. Integrating this system into the backend of the web application server would augment the safety and security measures of the online application. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20

    Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks by Al Ahmed, Mahmoud Tayseer, Hashim, Fazirulhisyam, Hashim, Shaiful Jahari, Abdullah, Azizol

    Published 2023
    “…These cluster chains are connected by another blockchain. A new consensus algorithm based on proof of identity authentication is adapted to the limited computational capabilities of IoT devices. …”
    Get full text
    Get full text
    Article