Search Results - (( its application ((kano algorithm) OR (based algorithm)) ) OR ( web applications _ algorithm ))
Search alternatives:
- web applications »
- its application »
- kano algorithm »
-
1
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
Get full text
Get full text
Thesis -
2
Efficient DNS based Load Balancing for Bursty Web Application Traffic
Published 2012“…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
Get full text
Get full text
Get full text
Article -
3
-
4
-
5
A Hybrid Approach For Web Search Result Clustering Based On Genetic Algorithm With K-means
Published 2024Get full text
journal::journal article -
6
Web Based Supervisor Supervisee Project Matching System
Published 2010Get full text
Get full text
Get full text
Thesis -
7
Modifying iEclat algorithm for infrequent patterns mining
Published 2018“…This paper proposes an enhancement algorithm based on iEclat algorithms for mining infrequent pattern.…”
Get full text
Get full text
Conference or Workshop Item -
8
Web-Based Route Optimization System For Logistic Using Agglomerative Clustering And Genetic Algorithm
Published 2020“…This system will first cluster those addresses based on the number of trucks involved and then perform the route optimization algorithm to suggest the shortest route to the user. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…The rapid growth of Web 2.0 applications, such as blogs and social networks creates rich online information and provides various new sources of knowledge. …”
Get full text
Get full text
Thesis -
10
-
11
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…This SOA implementation does not possess adequate security solutions within it, and its security is completely dependent on network/transport layer security that is obsolete owing to latest web technologies such as Web 2.0 and its upgraded version, Web 3.0. …”
Get full text
Get full text
Article -
12
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…This SOA implementation does not possess adequate security solutions within it, and its security is completely dependent on network/transport layer security that is obsolete owing to latest web technologies such as Web 2.0 and its upgraded version, Web 3.0. …”
Get full text
Get full text
Article -
13
Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment
Published 2011“…Besides, this algorithm provides home users or application developers to implement their own event operators with bespoke syntax for their application purpose by defining cross-events corresponding to the event operators. …”
Get full text
Get full text
Thesis -
14
Modifying iEclat algo ithm for infrequent patterns mining
Published 2018“…This paper proposes an enhancement algorithm based on iEclat algorithms for mining infrequent pattern.…”
Get full text
Get full text
Conference or Workshop Item -
15
DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS
Published 2012“…Grid, an infrastructure for resource sharing, currently has shown its importance in many scientific applications requiring tremendously high computational power. …”
Get full text
Get full text
Thesis -
16
Multi-population Genetic Algorithm for Rich Vehicle Routing Problems
Published 2020“…Results from the experiments show that MPGA-RVRP performs better compared to benchmark, Multi-objective Genetic Algorithm (MOGA). A web-based logistic sys�tem has also been developed as use case for MPGA-RVRP.…”
Get full text
Get full text
Final Year Project -
17
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…Currently, mobile botnet attacks have shifted from computers to smartphones due to its functionality, ease to exploit, and based on financial intention. …”
Proceedings Paper -
18
Marine Predator Algorithm and Related Variants: A Systematic Review
Published 2025“…The Marine Predators Algorithm (MPA) is classified under swarm intelligence methods based on its type of inspiration. …”
Get full text
Get full text
Article -
19
-
20
Augmented reality monitoring system for cross-belt conveyor in advanced automation line / Sukarnur Che Abdullah ... [et al.]
Published 2025“…The algorithm's efficacy was validated through its application to a basic material handling process, specifically a barcode sorting conveyor. …”
Get full text
Get full text
Get full text
Article
