Search
Search Results
-
Assuring Efficient Path Selection in an Intent-Based Networking System: A Graph Neural Networks and Deep Reinforcement Learning Approach
The recent advancements in network systems, including Software-Defined Networking (SDN), Network Functions Virtualization (NFV), and cloud...
-
Future of Web 3.0
The high-frequency term Web 3.0 is receiving more and more attention. We hear people around us discussing Web 3.0, digital people, metaverse, NFT,... -
Consistent and Quality-Aware Service Composition in Smart Cities
In this chapter, we review our research for dependable service composition for smart cities in both cyber and physical spaces. For the cyber space,... -
An improved ACO based service composition algorithm in multi-cloud networks
In recent years, with the rapid development of mobile communication networks, some new services such as cloud virtual reality, holographic...
-
Accessibility engineering in web evaluation process: a systematic literature review
Several works of literature contributed to the web evaluation process in recent years to promote digital inclusion by addressing several...
-
Knowledge Graph Enhanced Web API Recommendation via Neighbor Information Propagation for Multi-service Application Development
In cloud era, Web APIs have been the best carrier for service delivery, capability replication and data output in multi-service application... -
Creating Service
How to create angular service. -
Early web application attack detection using network traffic analysis
The number of deployed web applications and the number of web-based attacks in the last decade are constantly increasing. One group of tools that...
-
Design of a web based career counselling information system: Türkiye case
This research presents the design of Career Counselling Information System (CCIS), a web-based career counselling information system. The research...
-
A deep learning approach for collaborative prediction of Web service QoS
Web services are a cornerstone of many crucial domains, including cloud computing and the Internet of Things. In this context, QoS prediction for Web...
-
The indexation of retracted literature in seven principal scholarly databases: a coverage comparison of dimensions, OpenAlex, PubMed, Scilit, Scopus, The Lens and Web of Science
In this study, the coverage and overlap of retracted publications, retraction notices and withdrawals are compared across seven significant scholarly...
-
Web Scams Detection System
Web-based scams rely on scam websites to provide fraudulent business or fake services to steal money and sensitive information from unsuspecting... -
A multi-objective parameter optimization approach to maximize lifetime of wireless sensor networks inspired by spider web
Spider-web-inspired hierarchical clustering network is an emerging research topic in wireless sensor networks (WSNs), benefitting from the particular...
-
Heterogeneous ensemble learning method for personalized semantic web service recommendation
Semantic web service (SWS) discovery and recommendation (SWSR) has emerged as a potential technology which aims to fulfill the user requirements by...
-
A two-phase method to optimize service composition in cloud manufacturing
Service composition is widely employed in cloud manufacturing. Due to the abundance of similar cloud manufacturing services, the search space for...
-
Web Content Integrity: Tamper-Proof Websites Beyond HTTPS
We propose Web Content Integrity, a framework that allows a service provider to guarantee the integrity of their static website, even in the face of... -
Application of Machine Learning Algorithms for Detection of Vulnerability in Web Applications
The Internet is a world-class network that connects systems and electronic devices. As per the report, 4.66 billion people in the world use the...
-
Bias and the Web
Bias is everywhere, sometimes blatantly explicit, but most of the time it’s hidden, as it often arises from that which is missing, the gaps in our... -
Is iterative feature selection technique efficient enough? A comparative performance analysis of RFECV feature selection technique in ransomware classification using SHAP
The realm of cybersecurity places significant importance on early ransomware detection. Feature selection is critical in this context, as it enhances...