Search Results - (( its application server algorithm ) OR ( its detection system algorithm ))*

Refine Results
  1. 1

    Rangka kerja keselamatan transaksi bagi pelanggan pelayan berasaskan perdagangan elektronik by Abdullah, Abdul Hanan

    Published 2003
    “…Hashing function implementation have been using in this system as its cryptography algorithm. In authorised data security on client and server research, researcher mainly focused on data intrusions that can occur anytime without users awareness. …”
    Get full text
    Get full text
    Monograph
  2. 2

    Home intruder detection system using machine learning and IoT by Sahlan, Fadhluddin, Feizal, Faeez Zimam, Mansor, Hafizah

    Published 2022
    “…HIDES successfully achieves its objective in detecting persons precisely and alerting the detection to users through mobile application remotely. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin by Amiruddin, Amir Herman

    Published 2014
    “…Popularity of P2P applications usage; majorly on file-sharing and video streaming has gained vast popularity and so rapid which wake up network service providers of its dominance. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Detection of SQL injection attack using machine learning by Tung, Tean Thong

    Published 2024
    “…Integrating this system into the backend of the web application server would augment the safety and security measures of the online application. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    Energy and performance efficient resource allocation for cloud-based data centers by Akhter, Nasrin

    Published 2015
    “…In this study, we found that our proposed algorithms able to reduce energy consumption by 3% and 19% for host overload detection and VM selection algorithm respectively.…”
    Get full text
    Get full text
    Thesis
  6. 6

    Monitoring cathodic protection system for underground pipeline by Thai, Seng Choong

    Published 2013
    “…As the world is emerging into mobile technology, an innovative plan was made to combine traditional monitoring system into smart phones mobile application. An electronic prototype were designed, fabricated and tested to monitor the pipelines drain point voltage, transformer rectifier voltage, shunt current, humidity and temperature using a local server system whereby all the data collected are stored on a local storage before synchronizing to the internet’s web server database using the cloud system. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Development of a Reliable Multicast Protocol in Mobile Ad Hoc Networks by Alahdal, Tariq A. A.

    Published 2008
    “…The approaches were tested using detailed discrete-event simulation model which was developed encompassing messaging system that includes error, delay and mobility models to characterize the performance benefits of the proposed algorithms in comparison to ReMHoc protocol. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Smart student timetable planner by Wong, Xin Tong

    Published 2025
    “…The system is implemented using Node.js with Express for server-side development, HTML, CSS, and JavaScript for the frontend, and Socket.IO for real-time collaboration. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10
  11. 11
  12. 12

    Mobile machine vision for railway surveillance system using deep learning algorithm by Kit, Guan Lim, Daniel Siruno, Min, Keng Tan, Chung, Fan Liau, Sha, Huang, Tze, Kenneth Kin Teo

    Published 2021
    “…This model can be implemented with Raspberry Pi to simulate the object detection algorithm virtually. During simulation, the object recognition algorithm is able to detect and classify various objects into its respective classes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  13. 13

    Efficient DNS based Load Balancing for Bursty Web Application Traffic by Chin, Mei Lu, Chong, Eng Tan, Mohamad Imran, Bin Bandan

    Published 2012
    “…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi by Suhaimi, Hamizan

    Published 2021
    “…The performance of the proposed method and other existing techniques (Genetic Algorithm, Artificial Immune System and Immune-Genetic Algorithm) were analysed to evaluate and determine its efficiency in terms of maximum intrusion detection rate and the highest true positive rate. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17

    Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun by Kok , Sun Sun

    Published 2000
    “…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Embedded system based driver drowsiness detection system by Islam S.Z., Mohd Ali M.A., Bin Jidin R., Islam S.Z.

    Published 2023
    “…FPGA hardware is used as its processing platform along with Viola-Jones object detection algorithm. …”
    Conference paper
  20. 20

    Development of automatic pest sampling and detection system for cash crops by Hadi, Mustafa Kareem

    Published 2019
    “…Different kernel functions such as disk, diamond, square, and sphere are used as matching functions for insect detection and counting algorithm. The result of testing the hardware system of the automatic system shows its reliability and flexibility to provide accurate movements in two degrees of freedom as well as its dependability and system protection. …”
    Get full text
    Get full text
    Thesis