Search Results - (( ((its application) OR (_ application)) based algorithm ) OR ( web application use algorithm ))
Search alternatives:
-
1
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
Get full text
Get full text
Thesis -
2
-
3
-
4
Web based applications for energy management system incorporated network reconfiguration using genetic algorithm / Wan Adnan Wan
Published 2006“…This research was involved with the development of Web Based Applications for Energy Management System for providing Web application system, Web monitoring System and Genetic algorithm Based Network Reconfiguration Technique for loss minimization in the UiTM Distribution System. …”
Get full text
Get full text
Thesis -
5
Web Based Supervisor Supervisee Project Matching System
Published 2010Get full text
Get full text
Get full text
Thesis -
6
A Hybrid Approach For Web Search Result Clustering Based On Genetic Algorithm With K-means
Published 2024Get full text
journal::journal article -
7
A web-based implementation of k-means algorithms
Published 2022“…The K-means algorithm has been around for over a century. While a rather simplistic and dated algorithm, it remains widely used and taught till this day. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Web-Based Route Optimization System For Logistic Using Agglomerative Clustering And Genetic Algorithm
Published 2020“…This system will first cluster those addresses based on the number of trucks involved and then perform the route optimization algorithm to suggest the shortest route to the user. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Modifying iEclat algorithm for infrequent patterns mining
Published 2018“…This paper proposes an enhancement algorithm based on iEclat algorithms for mining infrequent pattern.…”
Get full text
Get full text
Conference or Workshop Item -
10
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…The rapid growth of Web 2.0 applications, such as blogs and social networks creates rich online information and provides various new sources of knowledge. …”
Get full text
Get full text
Thesis -
11
-
12
-
13
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…In this modern era of enterprise computing, the enterprise application integration (EAI) is a well-known industry-recognized architectural principle that is built based on loosely coupled application architecture, where service-oriented architecture (SOA) is the architectural pattern for the implementation of EAI, whose computational elements are called as â��services.â�� Though SOA can be implemented in a wide range of technologies, the web services implementation of SOA becomes the current selective choice due to its simplicity that works on basic Internet protocols. …”
Get full text
Get full text
Article -
14
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…In this modern era of enterprise computing, the enterprise application integration (EAI) is a well-known industry-recognized architectural principle that is built based on loosely coupled application architecture, where service-oriented architecture (SOA) is the architectural pattern for the implementation of EAI, whose computational elements are called as â��services.â�� Though SOA can be implemented in a wide range of technologies, the web services implementation of SOA becomes the current selective choice due to its simplicity that works on basic Internet protocols. …”
Get full text
Get full text
Article -
15
-
16
Enhancement of stemming process for malay illicit web content
Published 2012Get full text
Get full text
Thesis -
17
A new ant based rule extraction algorithm for web classification
Published 2011Get full text
Get full text
Get full text
Get full text
Monograph -
18
A web usage mining approach based on LCS algorithm in online predicting recommendation systems
Published 2008“…To provide online prediction efficiently, we advance an architecture for online predicting in Web Usage Mining system and propose a novel approach based on LCS algorithm for classifying user navigation patterns for predicting users' future requests. …”
Get full text
Get full text
Article -
19
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…Therefore, this paper presents a new mobile botnet classification based on permission and Application Programming Interface (API) calls in the smartphone. …”
Proceedings Paper -
20
DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS
Published 2012“…Grid, an infrastructure for resource sharing, currently has shown its importance in many scientific applications requiring tremendously high computational power. …”
Get full text
Get full text
Thesis
