Search Results - (( parallel detection model algorithm ) OR ( java application server algorithm ))
Search alternatives:
- parallel detection »
- application server »
- java application »
- server algorithm »
- detection model »
- model algorithm »
-
1
Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR)
Published 2026“…The hyperparameter optimization achieved best performance by implementing the EHS algorithm at the system level, thereby increasing feature-detection accuracy and bridging the gap between deep learning innovation and real-world malware detection and response models. …”
thesis::doctoral thesis -
2
Network game (Literati) / Chung Mei Kuen
Published 2003“…Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
Get full text
Get full text
Thesis -
3
Early detection of breast cancer using wave elliptic equation with high performance computing
Published 2008Get full text
Get full text
Get full text
Conference or Workshop Item -
4
-
5
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
6
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
Get full text
Get full text
Thesis -
7
A parallel ensemble learning model for fault detection and diagnosis of industrial machinery
Published 2023“…Accordingly, this paper proposes a new parallel ensemble model comprising hybrid machine and deep learning for undertaking FDD tasks. …”
Get full text
Get full text
Get full text
Article -
8
Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
Published 2019“…The approach was tested on the KDD Cup99 intrusion detection dataset and the results proved the proposed PSO-RKFLN as an accurate, reliable, and effective classification algorithm.…”
Get full text
Get full text
Conference or Workshop Item -
9
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
10
Parallel visualization approach of a 3D heart model
Published 2008Get full text
Get full text
Conference or Workshop Item -
11
-
12
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…On the basis of the results of this research, it can be concluded that the developed prototype had high accuracy and security when transferring the file between the sender and receiver that was implemented in client-server application. This research hopes to give a clear idea to the readers about ABS algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
13
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was mainly developing using java programming. Apache Tom cat was used as a server in order to run the application smoothly. …”
Get full text
Get full text
Thesis -
14
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
15
-
16
Active contour model on digital mammograms using low-cost parallel computing systems
Published 2009“…In this experiment the active contour algorithm is implemented in tracing the icrocalcifications. …”
Get full text
Book Section -
17
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Therefore, the core classifier in the hyper-heuristic approach of Intrusion Detection System (IDS) is developed to the parallel structure NN. …”
Get full text
Get full text
Thesis -
18
New CFAR algorithm and circuit development for radar receiver
Published 2020“…All these algorithms are simulated using MATLAB and applied them to three different clutter models that represent different environment cases. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The plugin can be 'installed' on any other web application with minimum efforts. The algorithm can be implemented as part of Web Server layer, not as part of the business logic layer. …”
Get full text
Get full text
Conference or Workshop Item -
20
A security payment model for financial payment using mykad
Published 2011“…However, if attack or intrusion is detected in less than 30 minutes, ARSA will automatically change the security algorithm to a new one. …”
Get full text
Get full text
Get full text
Get full text
Thesis
