Search Results - (( _ application means algorithm ) OR ( web applications ((new algorithm) OR (bat algorithm)) ))
Search alternatives:
- application means »
- web applications »
- means algorithm »
- new algorithm »
- bat algorithm »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
2
-
3
An efficient fuzzy C-least median clustering algorithm
Published 2021Get full text
Get full text
Get full text
Get full text
Article -
4
Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm
Published 2022“…This research will conduct comparison of hybrid Genetic Algorithm and Bat Algorithm (GA-BA) with Genetic Algorithm (GA) and Bat Algorithm (BA). …”
Get full text
Get full text
Get full text
Academic Exercise -
5
Route planner mobile web application for UiTM Malaysia / Suzana Ahmad ... [et al.]
Published 2009“…A Route Planner Mobile Web Application for UiTM Malaysia has been developed to produce a list of routes from two selected points in order of the shortest first. …”
Get full text
Get full text
Get full text
Article -
6
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…New Iterative Alternating Group Explicit (NAGE) is a powerful parallel numerical algorithm for multidimensional temperature prediction. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
-
8
Fuzzy Type-1 Triangular Membership Function Approximation Using Fuzzy C-Means
Published 2020“…Initially, the Fuzzy C-means algorithm is utilized to generate the parameters values of the Gaussian membership function. …”
Get full text
Get full text
Conference or Workshop Item -
9
Development of Web services fuzzy quality models using data clustering approach
Published 2014“…This paper presents the fuzzy clustering of web services' quality of service (QoS) data using Fuzzy C-Means (FCM) algorithm. …”
Get full text
Get full text
Article -
10
A new algorithm to measure relevance among Web pages
Published 2006“…This paper proposes a new algorithm to measure relevance among Web pages (RWP) using a hybrid method of hyperlink analysis and content analysis. …”
Get full text
Get full text
Get full text
Article -
11
Genetic Algorithm for Web Data Mining
Published 2001Get full text
Get full text
Project Paper Report -
12
Enhancement of stemming process for malay illicit web content
Published 2012Get full text
Get full text
Thesis -
13
Efficient DNS based Load Balancing for Bursty Web Application Traffic
Published 2012“…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
Get full text
Get full text
Get full text
Article -
14
The conceptual framework of knowledge of large scale and incomplete graphs of skyline queries optimization using machine learning
Published 2025“…The preliminary results using the K means Clustering Algorithm showed that the conceptual framework successfully grouped similar data points, facilitating the identification of skyline points. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
15
Intelligent cooperative web caching policies for media objects based on decision tree supervised machine learning algorithm
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
16
A new ant based rule extraction algorithm for web classification
Published 2011Get full text
Get full text
Get full text
Get full text
Monograph -
17
-
18
-
19
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
Published 2024“…Cross-site scripting (XSS) vulnerabilities are a major security threat for both desktop and mobile web applications. They occur due to lack of proper verification of the user inputs, which enables hackers to inject and execute malicious scripts in the web pages of an application. …”
Get full text
Get full text
Get full text
Thesis -
20
Steganography For Embedding Data In Digital Image
Published 2003“…In the design part, we present new data hiding algorithms for binary images, grayscale and color images, covering such applications as annotation, fingerprinting, and ownership protection.…”
Get full text
Get full text
Thesis
