Search Results - (( web application service algorithm ) OR ( web application design algorithm ))*
Search alternatives:
- application service »
- application design »
- service algorithm »
- design algorithm »
- web application »
-
1
A technique of dispatching algorithms for web-server cluster
Published 2011Get full text
Working Paper -
2
Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment
Published 2011“…By inheriting the capabilities of XML SOAP technology and Web Services, three new algorithms based on Event-Condition-Action (ECA) paradigm have been developed to facilitate efficient interoperation of the heterogeneous subsystems. …”
Get full text
Get full text
Thesis -
3
Integrating of web 2.0 technologies for interactive courseware : data structure and algorithm as case study
Published 2013“…Web 2.0 is commonly associated with Web applications that facilitate interactive information sharing, interoperability, user-centred design, and collaboration utilizing of technology. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
4
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
Published 2024“…Cross-site scripting (XSS) vulnerabilities are a major security threat for both desktop and mobile web applications. They occur due to lack of proper verification of the user inputs, which enables hackers to inject and execute malicious scripts in the web pages of an application. …”
Get full text
Get full text
Get full text
Thesis -
5
A Proposed False Report Identification Algorithm for a Mobile Application in the IoT Environment
Published 2024Proceedings Paper -
6
-
7
Web usage mining: A review of recent works
Published 2015“…Web mining is the application of data mining on web data and web usage mining is an important component of web mining. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
Web service applications and consumer environments based on ICT-driven optimization
Published 2022“…Therefore, this paper proposes a service recommendation model based on the hybrid embedding of multiple networks and designs a multinetwork hybrid embedding recommendation algorithm. …”
Get full text
Get full text
Article -
9
Mining Web usage using FRS
Published 2018“…Its application includes improving website design, personalised service, target marketing etc. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
10
Improving response time, availability and reliability through asynchronous replication technique in cluster architecture of web server cluster
Published 2010Get full text
Get full text
Conference or Workshop Item -
11
An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar
Published 2021“…Therefore, in this research, the first objective is to develop an algorithm for a remote AR-IoT monitoring system. The algorithm was designed by utilizing C++ and C# coding language. …”
Get full text
Get full text
Thesis -
12
Intent-IQ: customer’s reviews intent recognition using random forest algorithm
Published 2025“…Intent-IQ is a web application system which allows users to input Shopee product link and it leads to the intent classification, where the reviews can be classified into its intent categories such as praise, complaint and suggestion. …”
Get full text
Get full text
Get full text
Article -
13
Explore Ease
Published 2024“…This revolution is embodied by the groundbreaking web application "Explore Ease," which provides a state-of-the-art platform that links tourists with local hosts directly, resulting in personalized and authentic travel experiences. …”
Get full text
Get full text
Final Year Project -
14
Design and implementation of automatic number plate recognition on android platform
Published 2012“…Android platform has gained popularity in recent years in terms of market share and number of available applications. Android operating system is built on a modified Linux kernel with built-in services such as email, web browser, and map applications. …”
Get full text
Get full text
Get full text
Proceeding Paper -
15
Microcontroller-based face recognition system with web-based application for car security
Published 2023“…In addition, a web-based application was designed and developed to remotely control the car security access and to trigger the car alarm. …”
Article -
16
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017Get full text
Get full text
Conference or Workshop Item -
17
Design and implementation of a private and public key crypto processor for next-generation it security applications
Published 2006“…This paper presents the design and implementation of a crypto processor, a special-purpose embedded system optimized for the execution of cryptographic algorithms in hardware. …”
Get full text
Get full text
Get full text
Article -
18
Efficient DNS based Load Balancing for Bursty Web Application Traffic
Published 2012“…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
Get full text
Get full text
Get full text
Article -
19
Monitoring cathodic protection system for underground pipeline
Published 2013“…As the world is emerging into mobile technology, an innovative plan was made to combine traditional monitoring system into smart phones mobile application. An electronic prototype were designed, fabricated and tested to monitor the pipelines drain point voltage, transformer rectifier voltage, shunt current, humidity and temperature using a local server system whereby all the data collected are stored on a local storage before synchronizing to the internet’s web server database using the cloud system. …”
Get full text
Get full text
Thesis -
20
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…This paper is written to present one of such algorithms to prevent SOA attacks on RESTful web services along the discussion on the obtained results of the conducted proof-of-concept on the real-time SOA environment. …”
Get full text
Get full text
Article
