Search Results - (( mobile application drops algorithm ) OR ( web application using algorithms ))*
Search alternatives:
- application drops »
- using algorithms »
- web application »
-
1
Neighbour-based on-demand routing algorithms for mobile ad hoc networks
Published 2017“…In addition, with regard to the second algorithm SNBR, the results show that SNBR overcomes the NCPR algorithm terms of normalize routing overhead by 58.80% as its due to its dropping factor. …”
Get full text
Get full text
Get full text
Thesis -
2
Performance Enhancement of Routing Protocols in Mobile Wireless Ad-Hoc Networks Using Fuzzy Reasoning Algorithm
Published 2006“…We will present the various application of that algorithm to ad-hoc routing protocols. …”
Get full text
Get full text
Thesis -
3
Deep Learning-Driven Mobility And Utility-Based Resource Management In Mm-Wave Enable Ultradense Heterogeneous Networks
Published 2025thesis::doctoral thesis -
4
Text Extraction Algorithm for Web Text Classification
Published 2010“…A text extraction prototype is built using Visual C# 2008 to validate the algorithm. It is a windows application mixed with web connection protocol. …”
Get full text
Get full text
Get full text
Thesis -
5
Resource Allocation and Mobility Prediction Algorithms for Multimedia Wireless Cellular Networks
Published 2008“…Among the issues the telecommunication industry is the demand for multimedia applications with Quality of Service (QoS) in wireless/mobile networks. …”
Get full text
Get full text
Thesis -
6
A new algorithm to measure relevance among Web pages
Published 2006“…This paper proposes a new algorithm to measure relevance among Web pages (RWP) using a hybrid method of hyperlink analysis and content analysis. …”
Get full text
Get full text
Get full text
Article -
7
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
Get full text
Get full text
Thesis -
8
A modified π rough k-means algorithm for web page recommendation system
Published 2018“…To date, many works have been addressed in investigating the use of data mining techniques (e.g., Clustering) in Web page application. …”
Get full text
Get full text
Get full text
Thesis -
9
Web based applications for energy management system incorporated network reconfiguration using genetic algorithm / Wan Adnan Wan
Published 2006“…The development on Web Application system uses An ActiveX technology approach. …”
Get full text
Get full text
Thesis -
10
AntNet: a robust routing algorithm for data networks
Published 2004Get full text
Get full text
Get full text
Article -
11
Web Usage Mining for UUM Learning Care Using Association Rules
Published 2004“…Application of data mining techniques to the World Wide Web referred as Web mining where this term has been used in three distint ways; Web Content Mining, Web Structure Mining and Web Usage Mining. …”
Get full text
Get full text
Get full text
Thesis -
12
Enhancement of stemming process for malay illicit web content
Published 2012Get full text
Get full text
Thesis -
13
Web usage mining for UUM learning care using association rules
Published 2004“…Application of data milling techniques to the World Wide Web referred as Web mining where this term has been used in three distinct ways; Web Content Mining, Web Structure Mining and Web Usage Mining. …”
Get full text
Get full text
Thesis -
14
A web-based implementation of k-means algorithms
Published 2022“…The K-means algorithm has been around for over a century. While a rather simplistic and dated algorithm, it remains widely used and taught till this day. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
-
16
Effects of Authentication of Users in Mobile Internet Protocol Version 6
Published 2004“…Presently, mobility is difficult, if not impossible to detect at the application layer though easily detectable at the network layer. …”
Get full text
Get full text
Thesis -
17
Web application vulnerabilities detection model
Published 2016“…As the use of the web is increasing, the use of web application is also increasing. …”
Get full text
Get full text
Research Reports -
18
Web Usage Mining Using GSP Algorithm: A Study on Sultanah Bahiyah Library Online Databases
Published 2008“…In this study web usage mining use sequential pattern technique with GSP algorithm. …”
Get full text
Get full text
Get full text
Thesis -
19
Token based path allocation approach for mobile robots in sorting centre for achieving high throughput
Published 2024“…Thus, these problems seem to be the reasons that may be not that applicable and inefficient to apply in the real world. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
