Search Results - (( its application ((new algorithm) OR (_ algorithm)) ) OR ( web application service algorithm ))
Search alternatives:
- application service »
- service algorithm »
- its application »
- web application »
- new algorithm »
-
1
Efficient DNS based Load Balancing for Bursty Web Application Traffic
Published 2012“…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
Get full text
Get full text
Get full text
Article -
2
Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment
Published 2011“…Significant growths of subsystems are visible especially with new services, applications and devices in smart home environment. …”
Get full text
Get full text
Thesis -
3
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…This paper is written to present one of such algorithms to prevent SOA attacks on RESTful web services along the discussion on the obtained results of the conducted proof-of-concept on the real-time SOA environment. …”
Get full text
Get full text
Article -
4
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…This paper is written to present one of such algorithms to prevent SOA attacks on RESTful web services along the discussion on the obtained results of the conducted proof-of-concept on the real-time SOA environment. …”
Get full text
Get full text
Article -
5
-
6
-
7
A Proposed False Report Identification Algorithm for a Mobile Application in the IoT Environment
Published 2024Proceedings Paper -
8
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
-
10
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017Get full text
Get full text
Conference or Workshop Item -
11
Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm
Published 2022“…Furthermore, CloudSim simulator will be used to evaluate the performance of this algorithm. The result of the algorithm performance will be appeared in web application system. …”
Get full text
Get full text
Get full text
Academic Exercise -
12
Integrating of web 2.0 technologies for interactive courseware : data structure and algorithm as case study
Published 2013“…Web 2.0 is commonly associated with Web applications that facilitate interactive information sharing, interoperability, user-centred design, and collaboration utilizing of technology. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
13
Web-Based Route Optimization System For Logistic Using Agglomerative Clustering And Genetic Algorithm
Published 2020“…Although all of the objectives had been achieved the current system restricted user to make changes on the calculated route directly, the clustering algorithm and the route optimization algorithm applied are not wise enough and several enhancements can be made for this system. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
3D documenatation of the petalaindera: Digital heritage preservation methods using 3D laser scanner and photogrammetry
Published 2018“…In recent years, however, the advent of computer vision (CV) algorithms make it possible to reconstruct 3D geometry of objects by using image sequences from digital cameras, which are then processed by web services and freeware applications. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
15
Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari
Published 2017“…AES is being used widely in many applications since it is known for its faster encryption and decryption process and its strength. …”
Get full text
Get full text
Thesis -
16
Task scheduling in cloud computing using hybrid genetic algorithm and bald eagle search (GA-BES)
Published 2022“…The genetic algorithm was widely used because of its accuracy and simplicity. …”
Get full text
Get full text
Get full text
Academic Exercise -
17
3D documentation of the Petalaindera: digital heritage preservation methods using 3D laser scanner and photogrammetry
Published 2017“…In recent years, however, the advent of computer vision (CV) algorithms make it possible to reconstruct 3D geometry of objects by using image sequences from digital cameras, which are then processed by web services and freeware applications. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
3D documenatation of the petalaindera: Digital heritage preservation methods using 3D laser scanner and photogrammetry
Published 2018“…In recent years, however, the advent of computer vision (CV) algorithms make it possible to reconstruct 3D geometry of objects by using image sequences from digital cameras, which are then processed by web services and freeware applications. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
19
Intent-IQ: customer’s reviews intent recognition using random forest algorithm
Published 2025“…Intent-IQ is a web application system which allows users to input Shopee product link and it leads to the intent classification, where the reviews can be classified into its intent categories such as praise, complaint and suggestion. …”
Get full text
Get full text
Get full text
Article -
20
Mining Web usage using FRS
Published 2018“…Its application includes improving website design, personalised service, target marketing etc. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
