Search Results - (( iot applications ((tree algorithm) OR (bat algorithm)) ) OR ( web application new algorithm ))
Search alternatives:
- iot applications »
- web application »
- application new »
- tree algorithm »
- bat algorithm »
- new algorithm »
-
1
A Proposed False Report Identification Algorithm for a Mobile Application in the IoT Environment
Published 2024Proceedings Paper -
2
-
3
Intersection Features For Android Botnet Classification
Published 2019“…Many of IoT devices will be supposedly controlled through a mobile, giving application (apps) developers great opportunities in the development of new applications. …”
Get full text
Get full text
Get full text
Article -
4
A new algorithm to measure relevance among Web pages
Published 2006“…This paper proposes a new algorithm to measure relevance among Web pages (RWP) using a hybrid method of hyperlink analysis and content analysis. …”
Get full text
Get full text
Get full text
Article -
5
-
6
Genetic Algorithm for Web Data Mining
Published 2001Get full text
Get full text
Project Paper Report -
7
Enhancement of stemming process for malay illicit web content
Published 2012Get full text
Get full text
Thesis -
8
Efficient DNS based Load Balancing for Bursty Web Application Traffic
Published 2012“…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
Get full text
Get full text
Get full text
Article -
9
Intelligent cooperative web caching policies for media objects based on decision tree supervised machine learning algorithm
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
10
A new ant based rule extraction algorithm for web classification
Published 2011Get full text
Get full text
Get full text
Get full text
Monograph -
11
-
12
-
13
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
Published 2024“…Cross-site scripting (XSS) vulnerabilities are a major security threat for both desktop and mobile web applications. They occur due to lack of proper verification of the user inputs, which enables hackers to inject and execute malicious scripts in the web pages of an application. …”
Get full text
Get full text
Get full text
Thesis -
14
-
15
-
16
An efficient secure ECG compression based on 2D-SPIHT and SIT algorithm
Published 2017Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
17
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project is developed by using Rapid Application Development methodology as it is the model that is most suitable for developing this web tools. …”
Get full text
Get full text
Thesis -
18
-
19
Comparison of attribute selection methods for web texts categorization
Published 2010Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…This paper is written to present one of such algorithms to prevent SOA attacks on RESTful web services along the discussion on the obtained results of the conducted proof-of-concept on the real-time SOA environment. …”
Get full text
Get full text
Article
