Search Results - (( solution application server algorithm ) OR ( java application during algorithm ))
Search alternatives:
- solution application »
- application server »
- application during »
- server algorithm »
- java application »
- during algorithm »
-
1
-
2
Improving the security and encryption performance of cloud storage by using elliptic curve cryptography
Published 2016“…In this thesis, we have proposed a security solution based on an ECC algorithm to improve the security and the performance of the data by dividing the file content and encrypting it on both the server and the client side. …”
Get full text
Get full text
Thesis -
3
School teacher-subject allocation management system
Published 2024“…This project will build STSAMS as a web-based application in React.js that is equipped with API server, database, and the allotment algorithm with the Scrum methodology. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
Developing a prototype e-commerce application with credit card validation and secure transaction
Published 2005“…The application also includes an online credit card validation module that validates credit cards against the Luhn Algorithm and predefined credit card prefixes.The application will accept three types of credit cards which are Mastercard,Visa and American Express.The application is developed on the NET platform using ASP.NET and Visual Basic NET scripting.Therefore,the application could run on all kinds of platform.The application requires a Microsoft Server based operating system and Microsoft SQL Server in order for it to run.The application has been tested and runs successfully both on a server and on a workstation with server settings.In short,this system is the solution to the problems of current e-commerce technology.…”
Get full text
Get full text
Undergraduates Project Papers -
5
-
6
Implementing server-side federated learning in an edge-cloud framework for precision aquaculture
Published 2025Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
A new WDM Application Response Time in WLAN Network and Fixed WiMAX using Distributed
Published 2014“…The simulation results obtained for the application response time of the proposed Client-Server model show an improvement in network performance. …”
Get full text
Get full text
Conference or Workshop Item -
8
A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim
Published 2017“…In order to deliver the best presentation of content requested, the E-Learning system must possess a mechanism that not only capable of accurately discovering the characteristics and capabilities of a client's device but also capable of finding out about network and server resource availability. Three recurring issues need to be addressed when constructing such solutions: 1) How to identify the device characteristic and the capabilities of a device, 2) How to find out about network resource availability, and 3) How to adapt application behavior. …”
Get full text
Get full text
Thesis -
9
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
10
-
11
-
12
-
13
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
14
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
15
Ascertaining trust of information transmitted during a disaster
Published 2023“…One of the potential solutions is to use trust algorithm to identify the trusted information. …”
Article -
16
Ascertaining trust of information transmitted during a disaster
Published 2016“…One of the potential solutions is to use trust algorithm to identify the trusted information. …”
Get full text
Get full text
Article -
17
Ascertaining trust of information transmitted during a disaster
Published 2016“…One of the potential solutions is to use trust algorithm to identify the trusted information. …”
Get full text
Get full text
Article -
18
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The outcome of this study will add to the body of knowledge the most important and recent proposed solutions to mitigate SQL injection attack, in particular those based on machine learning algorithm…”
Get full text
Get full text
Get full text
Article -
19
Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment
Published 2011“…A Home Application Server (HAS) was configured for proof of concept. …”
Get full text
Get full text
Thesis -
20
Passenger Counting With Face Detection
Published 2020“…Passenger counting exhibits a wide variety of applications in the context of smart cities. Such applications range from retail analytics, queue management and space utilizations. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
