Search Results - (( web applications protocol algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    Text Extraction Algorithm for Web Text Classification by Theab, Mustafa Muwafak

    Published 2010
    “…A text extraction prototype is built using Visual C# 2008 to validate the algorithm. It is a windows application mixed with web connection protocol. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Soap performance enhancement for high volume messaging / Ali Baba Dauda by Ali Baba , Dauda

    Published 2018
    “…To achieve this aim, LZ77 compression algorithm is modified to encode more symbols. The algorithm is then integrated into two Web services with HTTP and JMS bindings. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…Web service technology defines several supporting protocols and specifications such as SOAP and WSDL for communication with client and server for data interchange. …”
    Get full text
    Get full text
    Article
  5. 5

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…Web service technology defines several supporting protocols and specifications such as SOAP and WSDL for communication with client and server for data interchange. …”
    Get full text
    Get full text
    Article
  6. 6
  7. 7
  8. 8
  9. 9

    Analysis On QOS Parameters To Predict Http Response by A.Rahman, Khairulnizam

    Published 2017
    “…However, it is not an easy task to propose the required QoS to users because of the dynamic nature of web services and web service features, uncertain with differences applications and web services of different QoS requirements. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Employing Public Key Infrastructure to Encapsulate Messages During Transport Layer Security Handshake Procedure by Nayeem Ahmad, Khan, Adnan Shahid, Khan, Seleviawati, Tarmizi, Azlina, Ahmadi Julaihi, Zeeshan, Ahmad

    Published 2022
    “…These protocols have been successfully used to protect World Wide Web communication between a client and a server that has been encoded using the HTTP protocol for many years. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  11. 11

    A general framework of genetic multi-agent routing protocol for improving the performance of MANET environment by Hassan, Mustafa Hamid, Jubair, Mohammed Ahmed, A. Mostafa, Salama, Kamaludin, Hazalila, Mustapha, Aida, Md Fudzee, Mohd Farhan, Mahdin, Hairulnizam

    Published 2020
    “…However, these communication services of MANET utilize a large amount of transfer speed (or bandwidth) and a huge measure of web speed. Bandwidth optimization is essential in different information interchanges for fruitful acknowledgement and the application of such a technological innovation. …”
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Resource management algorithms for wavelength division multiplexing optical metro slotted ring networks by Mohammed Abdulrazak, Fuaad Hasan

    Published 2012
    “…In addition, the increase in demand of bandwidth by web applications relying on multicasting has made optical fibers a preferred solution. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20

    Efficient dynamic DNA-based block cipher algorithm by Chng, Chern Wei

    Published 2023
    “…They possess a wide range of applications, spanning from guaranteeing the security of web traffic through protocols like SSL/TLS to encrypting confidential data stored on hard drives. …”
    Get full text
    Get full text
    Thesis