Results 11 to 20 of about 15,681,723 (368)

Semantic Web Application: Tourist Assisting Web Application

open access: yesInternational Journal for Research in Applied Science and Engineering Technology, 2022
Abstract: In addition to traditional web technologies, semantic web technology allows the implementation of the "web of things" and "web of linked data," enabling both machines and humans to access the web. The ultimate objective is to allow machines to do increasingly complex tasks and to design systems that can support network interactions. This goal
Abhyas Mall   +3 more
openaire   +2 more sources

Intelligent Web Applications as Future Generation of Web Applications [PDF]

open access: yesScientific Journal of Informatics, 2019
During the recent years World Wide Web very fast increased a fundamental part in our everyday life. In commerce, personal relationship, the effect of the universal network has wholly changed the way people interact with each other and with machines.
Karzan Wakil, Dayang N.A.Jawawi
doaj   +2 more sources

Tree Visualization By One Table (tvBOT): a web application for visualizing, modifying and annotating phylogenetic trees

open access: yesNucleic Acids Res., 2023
tvBOT is a user-friendly and efficient web application for visualizing, modifying, and annotating phylogenetic trees. It is highly efficient in data preparation without requiring redundant style and syntax data.
Jianmin Xie   +5 more
semanticscholar   +1 more source

Migrating legacy Web applications [PDF]

open access: yesCluster Computing, 2020
Since the adoption of portable devices like smartphones or smartwatches, the usage of applications has rapidly increased for supporting diverse daily activities from connecting with friends to measuring running distance. Since the Apps are an ubiquitous tool in everyday life, it is also an opportunity for a new digital business model.
Viviana Cajas   +3 more
openaire   +4 more sources

A Survey on Web Application Penetration Testing

open access: yesElectronics, 2023
Websites are becoming increasingly effective communication tools. Nevertheless, web applications are vulnerable to attack and can give attackers access to sensitive information or unauthorized access to accounts.
Esra Altulaihan   +2 more
semanticscholar   +1 more source

Deep Learning Technique-Enabled Web Application Firewall for the Detection of Web Attacks

open access: yesItalian National Conference on Sensors, 2023
New techniques and tactics are being used to gain unauthorized access to the web that harm, steal, and destroy information. Protecting the system from many threats such as DDoS, SQL injection, cross-site scripting, etc., is always a challenging issue ...
Babu R. Dawadi   +2 more
semanticscholar   +1 more source

Improving Ruby on Rails-Based Web Application Performance

open access: yesInformation, 2021
The evolution of web development and web applications has resulted in creation of numerous tools and frameworks that facilitate the development process.
Denys Klochkov, Jan Mulawka
doaj   +1 more source

LCZ Generator: A Web Application to Create Local Climate Zone Maps

open access: yesFrontiers in Environmental Science, 2021
Since their introduction in 2012, Local Climate Zones (LCZs) emerged as a new standard for characterizing urban landscapes, providing a holistic classification approach that takes into account micro-scale land-cover and associated physical properties. In
M. Demuzere, Jonas Kittner, B. Bechtel
semanticscholar   +1 more source

A Comparative Study of Web Application Security Parameters: Current Trends and Future Directions

open access: yesApplied Sciences, 2022
The growing use of the internet has resulted in an exponential rise in the use of web applications. Businesses, industries, financial and educational institutions, and the general populace depend on web applications.
Jahanzeb Shahid   +5 more
semanticscholar   +1 more source

WEB APPLICATION PROTECTION TECHNOLOGIES

open access: yesСучасні інформаційні системи, 2020
The subject matter of the article is the vulnerabilities that there are in web applications. The goal is to analyze the problem of violation of information security of web applications.
Volodymyr Pevnev   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy