Search Results - (( its application server algorithm ) OR ( its detection system algorithm ))*
Search alternatives:
- application server »
- server algorithm »
- system algorithm »
- its application »
- its detection »
-
1
Rangka kerja keselamatan transaksi bagi pelanggan pelayan berasaskan perdagangan elektronik
Published 2003“…Hashing function implementation have been using in this system as its cryptography algorithm. In authorised data security on client and server research, researcher mainly focused on data intrusions that can occur anytime without users awareness. …”
Get full text
Get full text
Monograph -
2
Home intruder detection system using machine learning and IoT
Published 2022“…HIDES successfully achieves its objective in detecting persons precisely and alerting the detection to users through mobile application remotely. …”
Get full text
Get full text
Get full text
Article -
3
An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin
Published 2014“…Popularity of P2P applications usage; majorly on file-sharing and video streaming has gained vast popularity and so rapid which wake up network service providers of its dominance. …”
Get full text
Get full text
Thesis -
4
Detection of SQL injection attack using machine learning
Published 2024“…Integrating this system into the backend of the web application server would augment the safety and security measures of the online application. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Energy and performance efficient resource allocation for cloud-based data centers
Published 2015“…In this study, we found that our proposed algorithms able to reduce energy consumption by 3% and 19% for host overload detection and VM selection algorithm respectively.…”
Get full text
Get full text
Thesis -
6
Monitoring cathodic protection system for underground pipeline
Published 2013“…As the world is emerging into mobile technology, an innovative plan was made to combine traditional monitoring system into smart phones mobile application. An electronic prototype were designed, fabricated and tested to monitor the pipelines drain point voltage, transformer rectifier voltage, shunt current, humidity and temperature using a local server system whereby all the data collected are stored on a local storage before synchronizing to the internet’s web server database using the cloud system. …”
Get full text
Get full text
Thesis -
7
-
8
Development of a Reliable Multicast Protocol in Mobile Ad Hoc Networks
Published 2008“…The approaches were tested using detailed discrete-event simulation model which was developed encompassing messaging system that includes error, delay and mobility models to characterize the performance benefits of the proposed algorithms in comparison to ReMHoc protocol. …”
Get full text
Get full text
Thesis -
9
Smart student timetable planner
Published 2025“…The system is implemented using Node.js with Express for server-side development, HTML, CSS, and JavaScript for the frontend, and Socket.IO for real-time collaboration. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Q-Learning-based detection of IPv6 intrusions: a behavioral and performance study
Published 2025“…The system improves classification accuracy with each training epoch, enhancing its reliability. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
-
12
Mobile machine vision for railway surveillance system using deep learning algorithm
Published 2021“…This model can be implemented with Raspberry Pi to simulate the object detection algorithm virtually. During simulation, the object recognition algorithm is able to detect and classify various objects into its respective classes. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
13
Efficient DNS based Load Balancing for Bursty Web Application Traffic
Published 2012“…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
Get full text
Get full text
Get full text
Article -
14
An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi
Published 2021“…The performance of the proposed method and other existing techniques (Genetic Algorithm, Artificial Immune System and Immune-Genetic Algorithm) were analysed to evaluate and determine its efficiency in terms of maximum intrusion detection rate and the highest true positive rate. …”
Get full text
Get full text
Thesis -
15
-
16
-
17
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
Get full text
Get full text
Thesis -
18
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis -
19
Embedded system based driver drowsiness detection system
Published 2023“…FPGA hardware is used as its processing platform along with Viola-Jones object detection algorithm. …”
Conference paper -
20
Development of automatic pest sampling and detection system for cash crops
Published 2019“…Different kernel functions such as disk, diamond, square, and sphere are used as matching functions for insect detection and counting algorithm. The result of testing the hardware system of the automatic system shows its reliability and flexibility to provide accurate movements in two degrees of freedom as well as its dependability and system protection. …”
Get full text
Get full text
Thesis
