Search Results - (( parallel detection model algorithm ) OR ( java application server algorithm ))

Refine Results
  1. 1

    Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR) by Chowdhury Sajadul Islam

    Published 2026
    “…The hyperparameter optimization achieved best performance by implementing the EHS algorithm at the system level, thereby increasing feature-detection accuracy and bridging the gap between deep learning innovation and real-world malware detection and response models. …”
    thesis::doctoral thesis
  2. 2

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider by Omer Fadlelmola Elkhider, Samih

    Published 2011
    “…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
    Get full text
    Get full text
    Thesis
  7. 7

    A parallel ensemble learning model for fault detection and diagnosis of industrial machinery by Shing, Chiang Ta, Mohammed Al-Andoli, Mohammed Nasser, Kok, Swee Sim, Seera, Manjeevan, Chee, Peng Lim

    Published 2023
    “…Accordingly, this paper proposes a new parallel ensemble model comprising hybrid machine and deep learning for undertaking FDD tasks. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System by Ali, Mohammed Hasan, Mohamed Fadli, Zolkipli

    Published 2019
    “…The approach was tested on the KDD Cup99 intrusion detection dataset and the results proved the proposed PSO-RKFLN as an accurate, reliable, and effective classification algorithm.…”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…On the basis of the results of this research, it can be concluded that the developed prototype had high accuracy and security when transferring the file between the sender and receiver that was implemented in client-server application. This research hopes to give a clear idea to the readers about ABS algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was mainly developing using java programming. Apache Tom cat was used as a server in order to run the application smoothly. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Active contour model on digital mammograms using low-cost parallel computing systems by Ibrahim, Arsmah, Alias, Norma, Sulaiman, Hanifah, Yasiran, Siti Salmah

    Published 2009
    “…In this experiment the active contour algorithm is implemented in tracing the icrocalcifications. …”
    Get full text
    Book Section
  17. 17

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…Therefore, the core classifier in the hyper-heuristic approach of Intrusion Detection System (IDS) is developed to the parallel structure NN. …”
    Get full text
    Get full text
    Thesis
  18. 18

    New CFAR algorithm and circuit development for radar receiver by Kamal, Mustafa Subhi

    Published 2020
    “…All these algorithms are simulated using MATLAB and applied them to three different clutter models that represent different environment cases. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…The plugin can be 'installed' on any other web application with minimum efforts. The algorithm can be implemented as part of Web Server layer, not as part of the business logic layer. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    A security payment model for financial payment using mykad by Ahmad Zahari, Nurul Huda

    Published 2011
    “…However, if attack or intrusion is detected in less than 30 minutes, ARSA will automatically change the security algorithm to a new one. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis