Search Results - (( code application server algorithm ) OR ( java application search algorithm ))
Search alternatives:
- application server »
- application search »
- code application »
- server algorithm »
- java application »
-
1
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…This study aims to compare the performance of Boyer-Moore, Knuth morris pratt, and Horspool algorithms in searching for the meaning of words in the Java-Indonesian dictionary search application in terms of accuracy and processing time. …”
Get full text
Get full text
Journal -
2
An Effective Fast Searching Algorithm for Internet Crawling Usage
Published 2016“…The search algorithm is a crucial part in any internet applications. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Efficient DNS based Load Balancing for Bursty Web Application Traffic
Published 2012“…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
Get full text
Get full text
Get full text
Article -
4
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…Hashed Message Authentication Code (HMAC) is widely used to provide authenticity, while symmetric encryption algorithms provide confidentiality. …”
Get full text
Get full text
Thesis -
5
-
6
Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase
Published 2007Get full text
Get full text
Conference or Workshop Item -
7
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
8
Songs Search Using Human Humming Voice
Published 2007Get full text
Get full text
Final Year Project -
9
-
10
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
Get full text
Get full text
Conference or Workshop Item -
11
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
Published 2024“…Another limitation is the limited or lack of focus on the removal of XSS vulnerabilities after their detection in the source code. Consequently, an approach called XSS-DETREM has been proposed with the objectives of combining genetic algorithms with static analysis, and a code replacement technique to detect and remove XSS vulnerabilities, respectively, to address the problem of XSS at the source code level. …”
Get full text
Get full text
Get full text
Thesis -
12
-
13
Server scanning worm detection by using intelligent failure connection algorithm
Published 2024Article -
14
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…Today, most web applications are vulnerable to SQL-injection attacks. …”
Get full text
Get full text
Get full text
Article -
15
Message based random variable length key encryption algorithm.
Published 2009Get full text
Get full text
Article -
16
-
17
Automated multi-factor analytics for cheat-proofing attendance-taking
Published 2018“…A potential application of smartphone is as a tool to prevent attendance cheating. …”
Get full text
Get full text
Article -
18
Network game (Literati) / Chung Mei Kuen
Published 2003“…Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
Get full text
Get full text
Thesis -
19
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Initially, this tool adopts only Crow Search, Jaya, and Sine Cosine algorithms. But more metaheuristics will be included in future research. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Evolutionary Music; Composing Beats and Chords Progression
Published 2020“…Evoluthm utilizes Harmony Search Algorithm and JFUGUE techniques in compliances with artificial intelligence (AI). …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
