Showing 41 - 60 results of 171 for search '"web application"', query time: 0.04s Refine Results
  1. 41
  2. 42
  3. 43
  4. 44
  5. 45
  6. 46
  7. 47

    Prediction of the remaining useful life of a milling machine using machine learning by Abbas Al-Refaie, Majd Al-atrash, Natalija Lepkova

    Published 2025-06-01
    “…This research seeks to develop a smart maintenance web application that utilizes Machine Learning (ML) supervised models to predict the Remaining Useful Life (RUL) for milling operations. …”
    Get full text
    Article
  8. 48

    Darunnajah Vote System Application Design Using PHP Programming Language by Supriadi Panggabean, Wahyu Joko Saputro, Faishal Wafiq Zakiy, Tutik Lestari, Ahmad Rifqi

    Published 2023-12-01
    “…The web application is built using PHP and MySQL with features of user management, class management, candidate management, and E-Voting. …”
    Get full text
    Article
  9. 49

    Research and Implementation of Massive Design Documents on Distributed Storage & Load Balancing by Liliang Su, Yunfu Wang, Bin Hou

    Published 2013-12-01
    “…The solution avoids user taking a long wait to access storage resources, breaks the bandwidth bottleneck of enterprise Web application in the LAN, reduces the burden on central storage, and achieves the global load balancing between Web application and distributed storage, so as to ensure the high availability of system.…”
    Get full text
    Article
  10. 50

    Research on the SQL injection filtering based on SQL syntax tree by Chen-wang HAN, Hui LIN, Chuan HUANG

    Published 2016-11-01
    “…The development of Web application make its areas become more and more widely.Followed by a security problem is becoming more and more serious,especially for the SQL injection attacks,which bring a huge challenge to the Web application security.A new SQL injection filtering method was proposed to detect SQL injection attack by introducing a security strategy based on SQL syntax tree to the design of the user input filtering.The experimental results show that the method can effectively prevent SQL injection attacks,and has higher recognition rate and lower rate of false positives.…”
    Get full text
    Article
  11. 51

    High School English Language Learners’ Experiences and Perceptions of Independent Online Content-Based Instruction by Kent Lee, Marilyn Abbott

    Published 2025-01-01
    “…To fill this gap, an innovative web application was designed to improve ELLs’ grade 10 science content and English language learning. …”
    Get full text
    Article
  12. 52

    Development of algorithm for calculation of operation and repair efficiency of a plate heat exchanger by S. M. Chekardovsky, K. N. Ilyukhin, A. A. Melekhin, M. N. Chekardovsky

    Published 2024-01-01
    “…A manual calculation of the exergy of the designed apparatus was performed as a solution to an applied problem to determine the efficiency of the designed heat exchanger. The web application ntcseis.ru of calculation of exergy efficiency of a plate heat exchanger was developed.Conclusions. …”
    Get full text
    Article
  13. 53

    An In-depth Analysis of Rendered Models using Blender : A Research Result by Oluwafunmilayo Raheem, Bourdillon Omijeh, Chinagorom Ibeachu

    Published 2024-12-01
    “…To evaluate the efficiency of the virtual reality system we compared the web application with other existing web applications using parameters such as Accuracy, Precision, Jaccard index, Dice co-efficient, Processing time, and user rating. …”
    Get full text
    Article
  14. 54

    Own Experience in the Use of Artificial Intelligence Technologies in the Diagnosis of Esophageal Achalasia by O. A. Storonova, N. I. Kanevskii, A. S. Trukhmanov, V. T. Ivashkin

    Published 2024-12-01
    “…The model has been applied to the creation of a web application which has the ability to substantiate the manometry diagnosis of patients. …”
    Get full text
    Article
  15. 55

    Models and scenarios of implementation of threats for internet resources by S. A. Lesko

    Published 2020-12-01
    “…To facilitate the detection of various vulnerabilities, there are many different tools (scanners) that can help analyze the security of web applications and facilitate the development of their protection. …”
    Get full text
    Article
  16. 56

    Bayesian Network analysis of software logs for data‐driven software maintenance by Santiago delRey, Silverio Martínez‐Fernández, Antonio Salmerón

    Published 2023-06-01
    “…These enhancement points enable the creation of cards in the Scrum process of the web application, contributing to its data‐driven software maintenance. …”
    Get full text
    Article
  17. 57

    A Novel Oil Spill Dataset Augmentation Framework Using Object Extraction and Image Blending Techniques by Farkhod Akhmedov, Halimjon Khujamatov, Mirjamol Abdullaev, Heung-Seok Jeon

    Published 2025-01-01
    “…To facilitate accessibility and usability, a Gradio-based web application was developed, featuring a user-friendly interface that allows users to input target and source images, customize augmentation parameters, and execute the augmentation process effectively. …”
    Get full text
    Article
  18. 58

    A METHOD OF CREATING DISTRIBUTED ENGINEERING KNOWLEDGE DATABASES by V. А. Kochurov

    Published 2017-12-01
    “…The cluster might be entered by means of a special web application which is an element of SILT using every device with a web browser and access to the internet.…”
    Get full text
    Article
  19. 59

    Research on Jersey and application in Web services by Yi-ming CHEN, Li-nan CHEN

    Published 2014-10-01
    “…In order to solve the current Web components appear weak poor scalability,the generality of the interface,interactive delay time problem,put forward the lightweight REST architecture,the Jersey is the REST architecture-the realization of the JAX-RS interface standards,through the research of its connectivity,addressable,statelessness,and stability and ease of use features,design a set of unified,efficient,fast and convenient access to the server Client API,implemented as different intelligent mobile terminal with unified Web application services.…”
    Get full text
    Article
  20. 60

    CoAP conformance testing based on TTCN-3 by Hong-qing DU, Xiao-hong HUANG, Jia-jie He

    Published 2013-09-01
    “…Protocol conformance test is of great importance in making sure that the protocol implementations conform to the protocol specification,thus helps protocol implementer to improve the implementations.CoAP (constrained application protocol) is a generic Web application specified for constrained nodes and constrained network which is currently an Internet draft.A CoAP conformance test suite based on TTCN-3,a standardized testing language,was designed,implemented and used after analyzing the protocol.…”
    Get full text
    Article