Search Results - (( its application system algorithm ) OR ( web application ((search algorithm) OR (_ algorithm)) ))
Search alternatives:
- system algorithm »
- its application »
- web application »
-
1
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…Indexer" to decide and index the relevant web pages, and ''Search algorithm" to retrieve the data from the results of indexing. …”
Get full text
Get full text
Thesis -
2
Restaurant locator using Djikstra Algorithm / Mohamad Aliff Hakimi Lukman Hakim
Published 2017Subjects: Get full text
Get full text
Thesis -
3
Task scheduling in cloud computing using hybrid genetic algorithm and bald eagle search (GA-BES)
Published 2022“…The genetic algorithm was widely used because of its accuracy and simplicity. …”
Get full text
Get full text
Get full text
Academic Exercise -
4
An Automated System For Classifying Conference Papers
Published 2021Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Web-based counselling system / Suvarna Supramaniam
Published 2002Get full text
Get full text
Thesis -
6
A new algorithm to measure relevance among Web pages
Published 2006“…RWP increases the search efficiency effectively and enhances the application area of Web related research.…”
Get full text
Get full text
Get full text
Article -
7
A Hybrid Approach For Web Search Result Clustering Based On Genetic Algorithm With K-means
Published 2024Get full text
journal::journal article -
8
Genetic Algorithm for Web Data Mining
Published 2001Get full text
Get full text
Project Paper Report -
9
Stemming Algorithm in Searching Malay Text
Published 2004Get full text
Get full text
Get full text
Thesis -
10
A hybrid Method Of Centroid-Based Clustering And Meta-Heuristic For Personalized Web Search
Published 2024thesis::doctoral thesis -
11
Searching Malay text using stemming algorithm
Published 2004Get full text
Get full text
Get full text
Article -
12
Malaysia Constitutional Law System, Study On The Use Advanced Searching Algorithm (Rule-Based And Horspool Algorithm)
Published 2017“…In this research, we study about the concept of advanced searching algorithm to build an intelligent web based system. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Text Extraction Algorithm for Web Text Classification
Published 2010“…A text extraction prototype is built using Visual C# 2008 to validate the algorithm. It is a windows application mixed with web connection protocol. …”
Get full text
Get full text
Get full text
Thesis -
14
-
15
Effective keyword query structuring using NER for XML retrieval
Published 2015Get full text
Get full text
Article -
16
Explore Ease
Published 2024“…The sophisticated search algorithm of the application makes customized vacation planning easier by allowing searches by category, date range, map location, and special needs like the number of guests, rooms, and bathrooms. …”
Get full text
Get full text
Final Year Project -
17
An improved framework for content and link-based web spam detection: a combined approach
Published 2021“…The content-based web spam detection framework uses three proposed and two improved content-based algorithms for web spam detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Efficient DNS based Load Balancing for Bursty Web Application Traffic
Published 2012“…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
Get full text
Get full text
Get full text
Article -
19
An Effective Fast Searching Algorithm for Internet Crawling Usage
Published 2016“…The search algorithm is a crucial part in any internet applications. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article
