-
41
Predictive modelling of sustainable concrete compressive strength using advanced machine learning algorithms
Published 2024-01-01Subjects: Get full text
Article -
42
A case study in statistical software development for advanced evidence synthesis: the combined value of analysts and research software engineers
Published 2025-01-01Subjects: Get full text
Article -
43
3D artistic mapping of the urban environment for tourism information support
Published 2024-01-01Subjects: Get full text
Article -
44
-
45
Building web apps with WordPress : WordPress as an application framework /
Published 2020Subjects: View in OPAC
Book -
46
Intrusion Detection for Wireless Sensor Network Using Particle Swarm Optimization Based Explainable Ensemble Machine Learning Approach
Published 2025-01-01Subjects: Get full text
Article -
47
Prediction of the remaining useful life of a milling machine using machine learning
Published 2025-06-01“…This research seeks to develop a smart maintenance web application that utilizes Machine Learning (ML) supervised models to predict the Remaining Useful Life (RUL) for milling operations. …”
Get full text
Article -
48
Darunnajah Vote System Application Design Using PHP Programming Language
Published 2023-12-01“…The web application is built using PHP and MySQL with features of user management, class management, candidate management, and E-Voting. …”
Get full text
Article -
49
Research and Implementation of Massive Design Documents on Distributed Storage & Load Balancing
Published 2013-12-01“…The solution avoids user taking a long wait to access storage resources, breaks the bandwidth bottleneck of enterprise Web application in the LAN, reduces the burden on central storage, and achieves the global load balancing between Web application and distributed storage, so as to ensure the high availability of system.…”
Get full text
Article -
50
Research on the SQL injection filtering based on SQL syntax tree
Published 2016-11-01“…The development of Web application make its areas become more and more widely.Followed by a security problem is becoming more and more serious,especially for the SQL injection attacks,which bring a huge challenge to the Web application security.A new SQL injection filtering method was proposed to detect SQL injection attack by introducing a security strategy based on SQL syntax tree to the design of the user input filtering.The experimental results show that the method can effectively prevent SQL injection attacks,and has higher recognition rate and lower rate of false positives.…”
Get full text
Article -
51
High School English Language Learners’ Experiences and Perceptions of Independent Online Content-Based Instruction
Published 2025-01-01“…To fill this gap, an innovative web application was designed to improve ELLs’ grade 10 science content and English language learning. …”
Get full text
Article -
52
Development of algorithm for calculation of operation and repair efficiency of a plate heat exchanger
Published 2024-01-01“…A manual calculation of the exergy of the designed apparatus was performed as a solution to an applied problem to determine the efficiency of the designed heat exchanger. The web application ntcseis.ru of calculation of exergy efficiency of a plate heat exchanger was developed.Conclusions. …”
Get full text
Article -
53
An In-depth Analysis of Rendered Models using Blender : A Research Result
Published 2024-12-01“…To evaluate the efficiency of the virtual reality system we compared the web application with other existing web applications using parameters such as Accuracy, Precision, Jaccard index, Dice co-efficient, Processing time, and user rating. …”
Get full text
Article -
54
Own Experience in the Use of Artificial Intelligence Technologies in the Diagnosis of Esophageal Achalasia
Published 2024-12-01“…The model has been applied to the creation of a web application which has the ability to substantiate the manometry diagnosis of patients. …”
Get full text
Article -
55
Models and scenarios of implementation of threats for internet resources
Published 2020-12-01“…To facilitate the detection of various vulnerabilities, there are many different tools (scanners) that can help analyze the security of web applications and facilitate the development of their protection. …”
Get full text
Article -
56
Bayesian Network analysis of software logs for data‐driven software maintenance
Published 2023-06-01“…These enhancement points enable the creation of cards in the Scrum process of the web application, contributing to its data‐driven software maintenance. …”
Get full text
Article -
57
A Novel Oil Spill Dataset Augmentation Framework Using Object Extraction and Image Blending Techniques
Published 2025-01-01“…To facilitate accessibility and usability, a Gradio-based web application was developed, featuring a user-friendly interface that allows users to input target and source images, customize augmentation parameters, and execute the augmentation process effectively. …”
Get full text
Article -
58
A METHOD OF CREATING DISTRIBUTED ENGINEERING KNOWLEDGE DATABASES
Published 2017-12-01“…The cluster might be entered by means of a special web application which is an element of SILT using every device with a web browser and access to the internet.…”
Get full text
Article -
59
Research on Jersey and application in Web services
Published 2014-10-01“…In order to solve the current Web components appear weak poor scalability,the generality of the interface,interactive delay time problem,put forward the lightweight REST architecture,the Jersey is the REST architecture-the realization of the JAX-RS interface standards,through the research of its connectivity,addressable,statelessness,and stability and ease of use features,design a set of unified,efficient,fast and convenient access to the server Client API,implemented as different intelligent mobile terminal with unified Web application services.…”
Get full text
Article -
60
CoAP conformance testing based on TTCN-3
Published 2013-09-01“…Protocol conformance test is of great importance in making sure that the protocol implementations conform to the protocol specification,thus helps protocol implementer to improve the implementations.CoAP (constrained application protocol) is a generic Web application specified for constrained nodes and constrained network which is currently an Internet draft.A CoAP conformance test suite based on TTCN-3,a standardized testing language,was designed,implemented and used after analyzing the protocol.…”
Get full text
Article