Search Results - (( its application service algorithm ) OR ( web application model algorithm ))*
Search alternatives:
- application service »
- service algorithm »
- application model »
- its application »
- web application »
- model algorithm »
-
1
Efficient DNS based Load Balancing for Bursty Web Application Traffic
Published 2012“…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
Get full text
Get full text
Get full text
Article -
2
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…In this modern era of enterprise computing, the enterprise application integration (EAI) is a well-known industry-recognized architectural principle that is built based on loosely coupled application architecture, where service-oriented architecture (SOA) is the architectural pattern for the implementation of EAI, whose computational elements are called as â��services.â�� Though SOA can be implemented in a wide range of technologies, the web services implementation of SOA becomes the current selective choice due to its simplicity that works on basic Internet protocols. …”
Get full text
Get full text
Article -
3
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…In this modern era of enterprise computing, the enterprise application integration (EAI) is a well-known industry-recognized architectural principle that is built based on loosely coupled application architecture, where service-oriented architecture (SOA) is the architectural pattern for the implementation of EAI, whose computational elements are called as â��services.â�� Though SOA can be implemented in a wide range of technologies, the web services implementation of SOA becomes the current selective choice due to its simplicity that works on basic Internet protocols. …”
Get full text
Get full text
Article -
4
-
5
Integrating of web 2.0 technologies for interactive courseware : data structure and algorithm as case study
Published 2013“…Web 2.0 is commonly associated with Web applications that facilitate interactive information sharing, interoperability, user-centred design, and collaboration utilizing of technology. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
6
-
7
Intent-IQ: customer’s reviews intent recognition using random forest algorithm
Published 2025“…Intent-IQ is a web application system which allows users to input Shopee product link and it leads to the intent classification, where the reviews can be classified into its intent categories such as praise, complaint and suggestion. …”
Get full text
Get full text
Get full text
Article -
8
Detection of SQL injection attack using machine learning
Published 2024“…Integrating this system into the backend of the web application server would augment the safety and security measures of the online application. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Enhancing geographic coordinates representation standard for reverse geocoding web services
Published 2018“…Reverse-geocoding is Location Base Services (LBS) that supports mobile and web applications. …”
Get full text
Get full text
Thesis -
10
Fakebuster: fake news detection system using logistic regression technique in machine learning
Published 2019“…This model is then integrated with web service that accepts input either news URL or news content in text which is then checked for its truth level through “FAKEBUSTER” application.…”
Get full text
Get full text
Article -
11
3D documenatation of the petalaindera: Digital heritage preservation methods using 3D laser scanner and photogrammetry
Published 2018“…In recent years, however, the advent of computer vision (CV) algorithms make it possible to reconstruct 3D geometry of objects by using image sequences from digital cameras, which are then processed by web services and freeware applications. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
3D documentation of the Petalaindera: digital heritage preservation methods using 3D laser scanner and photogrammetry
Published 2017“…In recent years, however, the advent of computer vision (CV) algorithms make it possible to reconstruct 3D geometry of objects by using image sequences from digital cameras, which are then processed by web services and freeware applications. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
3D documenatation of the petalaindera: Digital heritage preservation methods using 3D laser scanner and photogrammetry
Published 2018“…In recent years, however, the advent of computer vision (CV) algorithms make it possible to reconstruct 3D geometry of objects by using image sequences from digital cameras, which are then processed by web services and freeware applications. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
14
Dynamic feature selection model for adaptive cross site scripting attack detection using developed multi-agent deep Q learning model
Published 2023“…Web applications popularity has raised attention in various service domains, which increased the concern about cyber-attacks. …”
Get full text
Get full text
Get full text
Article -
15
-
16
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017Get full text
Get full text
Conference or Workshop Item -
17
Web application vulnerabilities detection model
Published 2016“…The research will be carried out by using design string matching algorithm. The algorithm is used in order to match the defined criteria of each web vulnerability with the input information about web application. …”
Get full text
Get full text
Research Reports -
18
Car dealership web application
Published 2022“…The web service performed model explaining and monitoring by querying the application data from the Azure SQL Database. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Cyberbullying detection: a machine learning approach
Published 2022“…Finally, the model was pickled and loaded into the web application. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Dynamic modeling by usage data for personalization systems
Published 2009Get full text
Get full text
Conference or Workshop Item
