Search Results - (( ais implementation model algorithm ) OR ( java application server algorithm ))
Search alternatives:
- implementation model »
- ais implementation »
- application server »
- java application »
- server algorithm »
- model algorithm »
-
1
Network game (Literati) / Chung Mei Kuen
Published 2003“…Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
Get full text
Get full text
Thesis -
2
Car dealership web application
Published 2022“…In countries like the US and Europe, explainable AI and AI monitoring had become well-received as commercial companies would soon be mandated to assess AI model risk and continuously review AI systems [1]. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
-
4
Active intelligent control of vibration of flexible plate structures
Published 2011“…However, the non-model based AVC algorithms are faster than their model-based AVC counterparts.…”
Get full text
Get full text
Thesis -
5
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
6
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
Get full text
Get full text
Thesis -
7
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
8
-
9
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…On the basis of the results of this research, it can be concluded that the developed prototype had high accuracy and security when transferring the file between the sender and receiver that was implemented in client-server application. This research hopes to give a clear idea to the readers about ABS algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
10
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was mainly developing using java programming. Apache Tom cat was used as a server in order to run the application smoothly. …”
Get full text
Get full text
Thesis -
11
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
12
Application of Artificial Intelligence In Smart City
Published 2021“…This study aims to study the effects of the implementation of AI in the smart city. The objectives of this study are to review the concepts of AI and smart city, conduct the Strength, Weakness, Opportunity, and Threat (SWOT) Analysis of deployment of AI in a smart city, and propose the future trends of AI implementation in a smart city. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Artificial intelligence techniques applied as estimator in chemical process systems - A literature survey
Published 2015“…Hence, in this paper, we provide a broad literature survey of several AI algorithms implemented as estimators in chemical systems together with their advantages, limitations, practical implications and comparisons between one another to guide researchers in selecting and designing the AI-based estimators. …”
Get full text
Get full text
Get full text
Article -
14
Anomaly detection for vision-based inspection
Published 2022“…Nevertheless, there are still some instances where AI models will fail to perform as intended, but generally the performance is good. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
The Implementation of Genetic Algorithm in Path Optimization
Published 2005“…In this project, TSP will be used to model and easy visualize the path optimization problem and Genetic Algorithm (GA) was chosen to be implemented in resolving the problem. …”
Get full text
Get full text
Final Year Project -
16
A Systematic Survey on the Research of AI-predictive Models for Wastewater Treatment Processes
Published 2023“…Lastly, can sort out the best AI technique to design predictive models for WWTP. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
17
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The plugin can be 'installed' on any other web application with minimum efforts. The algorithm can be implemented as part of Web Server layer, not as part of the business logic layer. …”
Get full text
Get full text
Conference or Workshop Item -
18
Reimagining English language learning: a systematic review of AI integration in classroom practice (2019–2024)
Published 2025“…This model serves as a practical guide for educators and stakeholders aiming to implement AI-enhanced pedagogies responsibly. …”
Get full text
Get full text
Get full text
Article -
19
-
20
Application of machine learning and artificial intelligence in detecting SQL injection attacks
Published 2024“…Datasets of well-known SQL injection attack patterns and AI/ML models intended for cybersecurity anomaly detection are among the resources underexplored, these findings show the potential for boosting detection capabilities by deploying ML and AI-based security solutions, with some algorithms scoring up to an 80 percent success rate in identifying SQL injections. …”
Get full text
Get full text
Get full text
Article
