Search Results - (( _ mitigation clustering algorithm ) OR ( web application during algorithm ))*

Refine Results
  1. 1

    A Hybrid K-Means Hierarchical Algorithm for Natural Disaster Mitigation Clustering by Prasetyadi, Abdurrakhman, Nugroho, Budi, Tohari, Adrin

    Published 2022
    “…Therefore, the proposed hybrid algorithm can provide relatively homogeneous clustering results in natural disaster mitigation.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Data-driven dynamic clustering framework for mitigating the adverse economic impact of Covid-19 lockdown practices by Rahman, Md. Arafatur, Nafees, Zaman, A. Taufiq, Asyhari, Al-Turjman, Fadi, Alam Bhuiyan, Md. Zakirul, Mohamad Fadli, Zolkipli

    Published 2020
    “…Through an intelligent fusion of healthcare and simulated mobility data, we model lockdown as a clustering problem and design a dynamic clustering algorithm for localized lockdown by taking into account the pandemic, economic and mobility aspects. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Enhancement Of Clustering Algorithm Using 3D Euclidean Distance To Improve Network Connectivity In Wireless Sensor Networks For Correlated Node Behaviours by Kalid Abdlkader Marsal Salih

    Published 2024
    “…Thus, this research proposes enhancement on clustering algorithm to mitigate the impact of correlated node behaviour on network performances. …”
    thesis::doctoral thesis
  4. 4
  5. 5

    Optimised content-social based features for fake news detection in social media using text clustering approach by Yahya, Adnan Hussein Ali

    Published 2025
    “…In general, the process of fake news detection was conducted in two different phases, the topic detection phase using a graph-based unsupervised clustering method based on HFPA and Markov Clustering Algorithm (MCL) called (HFPA-MCL) and the fake news detection phase using an unsupervised clustering method based on K-means algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Efficient DNS based Load Balancing for Bursty Web Application Traffic by Chin, Mei Lu, Chong, Eng Tan, Mohamad Imran, Bin Bandan

    Published 2012
    “…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    A framework of rough cultural algorithms in optimizing mobile web caching performance by Sulaiman, Sarina, Shamsuddin, Siti Maryam, Abraham, Ajith, Sulaiman, Shahida

    Published 2007
    “…The common cause of poor performance is due to the direct access to the server (e.g. pitiable performance of server-side applications or during burst crowds) and network infrastructure (e.g. long geographical distances, network overloads, etc.). …”
    Get full text
    Get full text
    Article
  8. 8

    An efficient up-link load reduction model based on clustering in vanets by Abbas Al-Sallami, Ali Hashim

    Published 2019
    “…This study proposed an Efficient Up-link Load Reduction (EULR) model to mitigate the uplink load at BSs. EULR model consisted of three parts: the first part, two novel algorithms Smart CH Election (SCHE) and Hybrid Cluster-Head Election (HCHE) to increase cluster stability and reduce the number of CHs changes in the network by selecting the best vehicle as cluster head (CH) based on two dynamic thresholds. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Web based applications for energy management system incorporated network reconfiguration using genetic algorithm / Wan Adnan Wan by Wan Chik, Wan Adnan

    Published 2006
    “…This research was involved with the development of Web Based Applications for Energy Management System for providing Web application system, Web monitoring System and Genetic algorithm Based Network Reconfiguration Technique for loss minimization in the UiTM Distribution System. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Target heart rate zone detector during exercise based on real-time facial expression using single shot detection algorithm / Muhammad Azziq Shamsudin, Raihah Aminuddin and Ummu Mar... by Shamsudin, Muhammad Azziq, Aminuddin, Raihah, Abdul Jalil, Ummu Mardhiah

    Published 2022
    “…As a solution, a web application named THR Zone detector is developed to access details about their specified THR according to the percentage intensity of the exercise. …”
    Get full text
    Get full text
    Get full text
    Book Section
  12. 12

    Data redundancy reduction scheme for data aggregation in wireless sensor network by Adawy, Mohammad Ibrahim

    Published 2020
    “…Therefore, several studies have employed some schemes to reduce data redundancy in the clustered network before data aggregation to mitigate the problems that affects the data aggregation efficiency. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    A web usage mining approach based on LCS algorithm in online predicting recommendation systems by Jalali, Mehrdad, Mustapha, Norwati, Sulaiman, Md. Nasir, Mamat, Ali

    Published 2008
    “…The Internet is one of the fastest growing areas of intelligence gathering. During their navigation Web users leave many records of their activity. …”
    Get full text
    Get full text
    Article
  14. 14

    Adaptive System State Based Load Balancing For Web Application Server Cluster Of Heterogeneous Performance Nodes by Lu, Chin Mei

    Published 2013
    “…This research is to propose a new efficient DNS-based load balancing algorithms that can solve a sudden increase of demand for service requests when they are applied to a local Domain Name Service (DNS) server for Web based applications and selected services. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Hybrid metaheuristic method for clustering in wireless sensor networks / Bryan Raj Peter Jabaraj by Bryan Raj , Peter Jabaraj

    Published 2023
    “…Moreover, two improvised clustering techniques are introduced to reduce the energy overhead cost from the re-clustering process. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    An Effective Power Dispatch Strategy for Clustered Micro-grids while Implementing Optimal Energy Management and Power Sharing Control using Power Line Communication by Ahmed Mohamed, Ahmed Haidar, Adila, Fakhar, Muttaqi, Kashem M

    Published 2019
    “…This paper proposes an effective power dispatch strategy for clustered micro-grids. The developed hybrid algorithm implements optimal energy management and power sharing control using binary data. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  17. 17
  18. 18

    Detecting lung cancer region from CT image using meta-heuristic optimized segmentation approach by Shakeel, Pethuraj Mohamed, Mohd Aboobaider, Burhanuddin, Salahuddin, Lizawati

    Published 2022
    “…In this paper, the butterfly optimization algorithm-based K-means clustering (BOAKMC) method is introduced for reducing CT image segmentation uncertainty. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Soap performance enhancement for high volume messaging / Ali Baba Dauda by Ali Baba , Dauda

    Published 2018
    “…To achieve this aim, LZ77 compression algorithm is modified to encode more symbols. The algorithm is then integrated into two Web services with HTTP and JMS bindings. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
    Get full text
    Get full text
    Thesis