Search Results - (( its application server algorithm ) OR ( its application learning algorithm ))*
Search alternatives:
- application learning »
- application server »
- learning algorithm »
- server algorithm »
- its application »
-
1
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…The system is able to update the information from the database provided that the administrator monitors its activities periodically. This system is achieved using the Genetic Algorithm which is capable of performing information retrieval and learning algorithm. …”
Get full text
Get full text
Thesis -
2
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…The proposed security architecture is constructed as an adaptive way-forward Internet-of-Things (IoT) friendly security solution that is comprised of three cyclic parts: learn, predict and prevent. A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
3
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…The proposed security architecture is constructed as an adaptive way-forward Internet-of-Things (IoT) friendly security solution that is comprised of three cyclic parts: learn, predict and prevent. A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
4
Detection of SQL injection attack using machine learning
Published 2024“…Integrating this system into the backend of the web application server would augment the safety and security measures of the online application. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Home intruder detection system using machine learning and IoT
Published 2022“…HIDES successfully achieves its objective in detecting persons precisely and alerting the detection to users through mobile application remotely. …”
Get full text
Get full text
Get full text
Article -
6
Mobility-aware Offloading Decision For Multi-access Edge Computing In 5g Networks
Published 2024journal::journal article -
7
-
8
NETASA: neural network based prediction of solvent accessibility
Published 2002“…In the present work, we have implemented a server, NETASA for predicting solvent accessibility of amino acids using our newly optimized neural network algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
-
10
-
11
Q-Learning-based detection of IPv6 intrusions: a behavioral and performance study
Published 2025Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
Three-dimensional structure of Human Epididymis Protein 4 (HE4): a protein modelling of an ovarian cancer biomarker through in silico approach
Published 2024“…These three servers em-ployed deep learning algorithms, threading templates, and de novomethods, respec-tively. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Efficient DNS based Load Balancing for Bursty Web Application Traffic
Published 2012“…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
Get full text
Get full text
Get full text
Article -
14
-
15
-
16
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…This technique also introduces a multi thread based persistence layer, which supports early binding and parallel connection to the servers. All the replication servers established its connection through interfaces. …”
Get full text
Get full text
Thesis -
17
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…Presently, many researches have been made on remote monitoring and its techniques. The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
Get full text
Get full text
Thesis -
18
-
19
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Effect of chaos noise on the learning ability of back propagation algorithm in feed forward neural network
Published 2010Subjects: Get full text
Working Paper
