Search Results - (( ((web application) OR (its application)) _ algorithm ) OR ( its applications based algorithm ))*

Refine Results
  1. 1

    Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun by Kok , Sun Sun

    Published 2000
    “…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Efficient DNS based Load Balancing for Bursty Web Application Traffic by Chin, Mei Lu, Chong, Eng Tan, Mohamad Imran, Bin Bandan

    Published 2012
    “…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Modifying iEclat algorithm for infrequent patterns mining by Julaily Aida, J., Mustafa, M.

    Published 2018
    “…Pattern ruining has been extensively studied in research due to its successful application in several data mining scenarios. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6
  7. 7

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…In this modern era of enterprise computing, the enterprise application integration (EAI) is a well-known industry-recognized architectural principle that is built based on loosely coupled application architecture, where service-oriented architecture (SOA) is the architectural pattern for the implementation of EAI, whose computational elements are called as â��services.â�� Though SOA can be implemented in a wide range of technologies, the web services implementation of SOA becomes the current selective choice due to its simplicity that works on basic Internet protocols. …”
    Get full text
    Get full text
    Article
  8. 8

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…In this modern era of enterprise computing, the enterprise application integration (EAI) is a well-known industry-recognized architectural principle that is built based on loosely coupled application architecture, where service-oriented architecture (SOA) is the architectural pattern for the implementation of EAI, whose computational elements are called as â��services.â�� Though SOA can be implemented in a wide range of technologies, the web services implementation of SOA becomes the current selective choice due to its simplicity that works on basic Internet protocols. …”
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Modifying iEclat algo ithm for infrequent patterns mining by Julaily Aida, Jusoh, Mustafa, Man

    Published 2018
    “…Pattern ruining has been extensively studied in research due to its successful application in several data mining scenarios. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS by MEHMOOD SHAH, SYED NASIR

    Published 2012
    “…Grid, an infrastructure for resource sharing, currently has shown its importance in many scientific applications requiring tremendously high computational power. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14

    Web-Based Route Optimization System For Logistic Using Agglomerative Clustering And Genetic Algorithm by Tan, Chee Kuan

    Published 2020
    “…This system enables the logistic company to arrange its route to deliver based on the number of trucks selected by the user. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15

    Content-based recommender system for an academic social network / Vala Ali Rohani by Vala Ali, Rohani

    Published 2014
    “…In its formulation, the algorithm considers the interests and preferences of users’ friends and faculty mates in addition to users’ own preferences. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A New Mobile Botnet Classification based on Permission and API Calls by Yusof, M, Saudi, MM, Ridzuan, F

    Published 2024
    “…Currently, mobile botnet attacks have shifted from computers to smartphones due to its functionality, ease to exploit, and based on financial intention. …”
    Proceedings Paper
  17. 17

    Multi-population Genetic Algorithm for Rich Vehicle Routing Problems by Agany Manyiel, Joseph Mabor

    Published 2020
    “…However, genetic algorithm is stochastic in nature and does not guarantee optimal solution in an application all the time, a problem referred to as premature convergence in literature. …”
    Get full text
    Get full text
    Final Year Project
  18. 18

    Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment by Perumal, Thinagaran

    Published 2011
    “…Besides, this algorithm provides home users or application developers to implement their own event operators with bespoke syntax for their application purpose by defining cross-events corresponding to the event operators. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Comprehensive review of the development of the harmony search algorithm and its applications by Al-Omoush, A.A., Alsewari, Abdulrahman A., Alamri, Hammoudeh S., Kamal Z., Zamli

    Published 2019
    “…This paper presents a comprehensive overview of the development of the harmony search (HS) algorithm and its applications. HS is a well-known human-based meta-heuristic algorithm that mimics the process of creating a new harmony in music. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Marine Predator Algorithm and Related Variants: A Systematic Review by Philibus, Emmanuel, Mohd Zain, Azlan, Prasetya, Didik Dwi, Bahari, Mahadi, Yusup, Norfadzlan, Abdul Jalil, Rozita, Abdul Majid, Mazlina, A Samah, Azurah

    Published 2025
    “…The Marine Predators Algorithm (MPA) is classified under swarm intelligence methods based on its type of inspiration. …”
    Get full text
    Get full text
    Article