Search Results - (( web applications protocol algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- applications protocol »
- protocol algorithm »
- implication based »
- web applications »
- java implication »
-
1
Text Extraction Algorithm for Web Text Classification
Published 2010“…A text extraction prototype is built using Visual C# 2008 to validate the algorithm. It is a windows application mixed with web connection protocol. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
Soap performance enhancement for high volume messaging / Ali Baba Dauda
Published 2018“…To achieve this aim, LZ77 compression algorithm is modified to encode more symbols. The algorithm is then integrated into two Web services with HTTP and JMS bindings. …”
Get full text
Get full text
Get full text
Thesis -
4
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…Web service technology defines several supporting protocols and specifications such as SOAP and WSDL for communication with client and server for data interchange. …”
Get full text
Get full text
Article -
5
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…Web service technology defines several supporting protocols and specifications such as SOAP and WSDL for communication with client and server for data interchange. …”
Get full text
Get full text
Article -
6
-
7
Impact of low-dose protocols on computed tomography of lung cancer screening on the intrinsic performance metrics: a phantom study
Published 2023Get full text
Get full text
Conference or Workshop Item -
8
-
9
Analysis On QOS Parameters To Predict Http Response
Published 2017“…However, it is not an easy task to propose the required QoS to users because of the dynamic nature of web services and web service features, uncertain with differences applications and web services of different QoS requirements. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Employing Public Key Infrastructure to Encapsulate Messages During Transport Layer Security Handshake Procedure
Published 2022“…These protocols have been successfully used to protect World Wide Web communication between a client and a server that has been encoded using the HTTP protocol for many years. …”
Get full text
Get full text
Get full text
Proceeding -
11
A general framework of genetic multi-agent routing protocol for improving the performance of MANET environment
Published 2020“…However, these communication services of MANET utilize a large amount of transfer speed (or bandwidth) and a huge measure of web speed. Bandwidth optimization is essential in different information interchanges for fruitful acknowledgement and the application of such a technological innovation. …”
Get full text
Get full text
Article -
12
-
13
Resource management algorithms for wavelength division multiplexing optical metro slotted ring networks
Published 2012“…In addition, the increase in demand of bandwidth by web applications relying on multicasting has made optical fibers a preferred solution. …”
Get full text
Get full text
Thesis -
14
TELE-OPERATED ROBOT USING VC PROGRAMMING PROTOCOL
Published 2007Get full text
Get full text
Final Year Project -
15
-
16
A review energy-efficient task scheduling algorithms in cloud computing
Published 2023Conference Paper -
17
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
18
Development of LabVIEW FPGA program for Energy Management System (EMS) Controller for Hybrid Electric Vehicle (HEV)
Published 2016Get full text
Get full text
Final Year Project -
19
Enhancing problem-solving skills of novice programmers in an introductory programming course
Published 2023Article -
20
Efficient dynamic DNA-based block cipher algorithm
Published 2023“…They possess a wide range of applications, spanning from guaranteeing the security of web traffic through protocols like SSL/TLS to encrypting confidential data stored on hard drives. …”
Get full text
Get full text
Thesis
