Search Results - (( its application server algorithm ) OR ( _ applications learning algorithm ))*
Search alternatives:
- applications learning »
- application server »
- learning algorithm »
- server algorithm »
- its application »
- _ applications »
-
1
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…The system is able to update the information from the database provided that the administrator monitors its activities periodically. This system is achieved using the Genetic Algorithm which is capable of performing information retrieval and learning algorithm. …”
Get full text
Get full text
Thesis -
2
Detection of SQL injection attack using machine learning
Published 2024“…Integrating this system into the backend of the web application server would augment the safety and security measures of the online application. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…The proposed security architecture is constructed as an adaptive way-forward Internet-of-Things (IoT) friendly security solution that is comprised of three cyclic parts: learn, predict and prevent. A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
4
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…The proposed security architecture is constructed as an adaptive way-forward Internet-of-Things (IoT) friendly security solution that is comprised of three cyclic parts: learn, predict and prevent. A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
5
Mobility-aware Offloading Decision For Multi-access Edge Computing In 5g Networks
Published 2024journal::journal article -
6
Home intruder detection system using machine learning and IoT
Published 2022“…HIDES successfully achieves its objective in detecting persons precisely and alerting the detection to users through mobile application remotely. …”
Get full text
Get full text
Get full text
Article -
7
-
8
-
9
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…To process large-scale data sequences, it is important to choose a suitable learning algorithm that is capable to learn in real time. …”
Get full text
Get full text
Thesis -
10
Efficient DNS based Load Balancing for Bursty Web Application Traffic
Published 2012“…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
Get full text
Get full text
Get full text
Article -
11
Q-Learning-based detection of IPv6 intrusions: a behavioral and performance study
Published 2025Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
NETASA: neural network based prediction of solvent accessibility
Published 2002“…In the present work, we have implemented a server, NETASA for predicting solvent accessibility of amino acids using our newly optimized neural network algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
-
14
Three-dimensional structure of Human Epididymis Protein 4 (HE4): a protein modelling of an ovarian cancer biomarker through in silico approach
Published 2024“…These three servers em-ployed deep learning algorithms, threading templates, and de novomethods, respec-tively. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
-
16
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…This technique also introduces a multi thread based persistence layer, which supports early binding and parallel connection to the servers. All the replication servers established its connection through interfaces. …”
Get full text
Get full text
Thesis -
17
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…Presently, many researches have been made on remote monitoring and its techniques. The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
Get full text
Get full text
Thesis -
18
-
19
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Peer to peer trade in HTM5 meta model for agent oriented cloud robotic systems
Published 2015“…These cloud servers treat robots as any other client computer offering them platform, infrastructure, process or algorithm as a service. …”
Get full text
Get full text
Article
