Search Results - (( web application ((_ algorithm) OR (based algorithm)) ) OR ( web application towards algorithm ))

Search alternatives:

Refine Results
  1. 1
  2. 2

    ScholarsAid: a personalized scholarship web application based on web scraping/ Muhammad Nur Haqeem Sulaiman and Norhasliza Ahmad by Sulaiman, Muhammad Nur Haqeem, Ahmad, Norhasliza

    Published 2023
    “…The web application offers functionality for students to search and filter scholarships to suit their preferences or needs and the most relevant scholarships are provided based on matching algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Towards cross-site scripting vulnerability detection in mobile web applications by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty

    Published 2018
    “…This paper presents work in progress on detecting cross-site scripting vulnerabilities in mobile versions of web applications. It proposes an enhanced genetic algorithm-based approach that detects cross-site scripting vulnerabilities in mobile versions of web applications. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Marine Predator Algorithm and Related Variants: A Systematic Review by Philibus, Emmanuel, Mohd Zain, Azlan, Prasetya, Didik Dwi, Bahari, Mahadi, Yusup, Norfadzlan, Abdul Jalil, Rozita, Abdul Majid, Mazlina, A Samah, Azurah

    Published 2025
    “…The Marine Predators Algorithm (MPA) is classified under swarm intelligence methods based on its type of inspiration. …”
    Get full text
    Get full text
    Article
  6. 6

    Marine Predator Algorithm and Related Variants: A Systematic Review by Philibus, Emmanuel, Mohd Zain, Azlan, Dwi Prasetya, Didik, Bahari, Mahadi, Yusup, Norfadzlan, Abdul Jalil, Rozita, Abdul Majid, Mazlina, A Samah, Azurah

    Published 2025
    “…The Marine Predators Algorithm (MPA) is classified under swarm intelligence methods based on its type of inspiration. …”
    Get full text
    Get full text
    Article
  7. 7
  8. 8
  9. 9

    Danger theory inspired artificial immune system for pattern recognition by Chung Seng Kheau, Rayner Alfred, Lau, Hui Keng, Jason Teo, Mohd. Hanafi Ahmad Hijazi, Nurul'alam Mohd. Yaakub

    Published 2007
    “…Increasing intensive studies on reflecting human immune system's mechanism in computer systems has developed a new computing framework which is called the Artificial Immune System (AIS). Numerous AIS-based applications have been discovered such as anomaly detection system and user-preference based web contents applications of which possess pattern recognition ability. …”
    Get full text
    Get full text
    Research Report
  10. 10

    Quantum Particle Swarm Optimization Technique for Load Balancing in Cloud Computing by Elrasheed Ismail, Sultan

    Published 2013
    “…Performance of the QPSO technique based on many heuristic algorithms it is comprised the following steps. …”
    Get full text
    Thesis
  11. 11

    Integrating of web 2.0 technologies for interactive courseware : data structure and algorithm as case study by Mohd Nurhafeezi, Nordin

    Published 2013
    “…Web 2.0 is commonly associated with Web applications that facilitate interactive information sharing, interoperability, user-centred design, and collaboration utilizing of technology. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  12. 12
  13. 13
  14. 14

    Resource management algorithms for wavelength division multiplexing optical metro slotted ring networks by Mohammed Abdulrazak, Fuaad Hasan

    Published 2012
    “…In addition, the increase in demand of bandwidth by web applications relying on multicasting has made optical fibers a preferred solution. …”
    Get full text
    Get full text
    Thesis
  15. 15

    A collaborative agent based green IS practice assessment tool for environmental sustainability attainment in enterprise data centers by Anthony, Bokolo Jnr., Mazlina, Abdul Majid, Awanis, Romli

    Published 2018
    “…Design/methodology/approach; The methodology comprises that the collaborative agent-based web architecture, agents’ algorithm and the green IS assessment tool, which is validated by employing focus group questionnaire targeting IT practitioners in seven Malaysian-based enterprises that have an in-house data centers. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim by Ibrahim, Mohd Faisal

    Published 2017
    “…A prototype of the proposed architecture was built and validated which the focus is towards determining the decision algorithm precision and measuring the video assimilation. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19

    The exploration of hybrid metaheuristics-based approaches: A bibliometric analysis by Nur Hidayah, Azmidi, Noryanti, Muhammad, Rozieana, Khairuddin

    Published 2025
    “…The study findings indicate a growing and broader trend towards the integration of metaheuristics and optimization algorithms, echoing the interdisciplinary nature of this domain. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Adopting Jaya Algorithm for Team Formation Problem by Kader, Md. Abdul, Kamal Z., Zamli

    Published 2020
    “…This paper presents a simple and mighty metaheuristic algorithm, Jaya, which is applied to solve the team formation (TF) problem and it is a very fundamental problem in many databases and expert collaboration networks or web applications. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item