Results 1 to 10 of about 2,952,505 (245)

A multi-pattern hash-binary hybrid algorithm for URL matching in the HTTP protocol. [PDF]

open access: yesPLoS ONE, 2017
In this paper, based on our previous multi-pattern uniform resource locator (URL) binary-matching algorithm called HEM, we propose an improved multi-pattern matching algorithm called MH that is based on hash tables and binary tables. The MH algorithm can
Ping Zeng   +7 more
doaj   +2 more sources

Comparison of WebSocket and HTTP protocol performance

open access: yesJournal of Computer Sciences Institute, 2021
The aim of the author of this article is analyze the performance of WebSocket and HTTP protocol and their comparison. For this purpose, was used equipment working in a local network consisting of server, two client computers, switch and self-created ...
Wojciech Łasocha, Marcin Badurowicz
doaj   +3 more sources

Server Program Analysis Based on HTTP Protocol [PDF]

open access: yesMATEC Web of Conferences, 2016
The overwhelming majority of Web developments are built based on Web application of HTTP protocol. To analyze the server program based on the HTTP protocol and the process of interaction between the browser and server, a simple HTTP-based server program ...
Che Min, Tuo Ming Fu
doaj   +2 more sources

Evaluation of HTTP/3 Protocol for Internet of Things and Fog Computing Scenarios [PDF]

open access: yesRevista Română de Informatică și Automatică, 2021
The paper investigates the performance properties of the new HTTP/3 protocol in IoT scenarios, with the focus on fog computing. A specific experimental environment is created, providing realistic IoT conditions.
Marjan MILOŠEVIĆ   +2 more
doaj   +1 more source

Web Application Firewall Based on Anomaly Detection using Deep Learning

open access: yesActa Infologica, 2022
Anomaly detection has been researched in different areas and application domains. The main difficulty is to identify the outliers from the normals in case of encountering an input that has unique features and new values. In order to accomplish this task,
Sezer Toprak, Ali Gökhan Yavuz
doaj   +1 more source

Protokol HTTPS, Apakah Benar-benar Aman?

open access: yesJournal of Applied Computer Science and Technology, 2021
In particular, the method used in this research is a case study where previously the p3m.pnp.ac.id website still uses the http protocol. However http protocol does not have a method of securing data in its communication.
Deddy Prayama, Yuhefizar, Amelia Yolanda
doaj   +1 more source

Third-party transfers in WLCG using HTTP [PDF]

open access: yesEPJ Web of Conferences, 2020
Since its earliest days, the Worldwide LHC Computational Grid (WLCG) has relied on GridFTP to transfer data between sites. The announcement that Globus is dropping support of its open source Globus Toolkit (GT), which forms the basis for several FTP ...
Bockelman Brian   +5 more
doaj   +1 more source

Optimasi Jalur Transfer Data dari HTTP menjadi MQTT pada IoT menggunakan Cloud Services

open access: yesJISA (Jurnal Informatika dan Sains), 2020
At this time, in the era of technological development and information that incresingly very fast, introduced smart device systems that can help any stuff and conditions of human work, this technology is known as IoT or the abbreviation of Internet of ...
Claudia Felicia Permatasari, Harry Dhika
doaj   +1 more source

Analisis Kinerja Protokol MQTT dan HTTP Pada Akuisisi Data Magnet Berbasis Internet of Things

open access: yesJurnal Ilmiah Informatika, 2021
One of the determinants of the quality of magnetic data is continuous data, so we need a data transmission system that can continuously transmit observational data.
Hairatunnisa   +2 more
doaj   +1 more source

Amassing the Security: An Enhanced Authentication Protocol for Drone Communications over 5G Networks

open access: yesDrones, 2021
At present, the great progress made by the Internet of Things (IoT) has led to the emergence of the Internet of Drones (IoD). IoD is an extension of the IoT, which is used to control and manipulate drones entering the flight area.
Tsuyang Wu   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy