Search Results - (( web application ((a algorithm) OR (based algorithm)) ) OR ( _ applications need algorithm ))

Refine Results
  1. 1

    Efficient DNS based Load Balancing for Bursty Web Application Traffic by Chin, Mei Lu, Chong, Eng Tan, Mohamad Imran, Bin Bandan

    Published 2012
    “…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    A web usage mining approach based on LCS algorithm in online predicting recommendation systems by Jalali, Mehrdad, Mustapha, Norwati, Sulaiman, Md. Nasir, Mamat, Ali

    Published 2008
    “…To provide online prediction efficiently, we advance an architecture for online predicting in Web Usage Mining system and propose a novel approach based on LCS algorithm for classifying user navigation patterns for predicting users' future requests. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5
  6. 6

    Modifying iEclat algorithm for infrequent patterns mining by Julaily Aida, J., Mustafa, M.

    Published 2018
    “…A few parts of this algorithm need a modification to assure that it is suitable for mining infrequent pattern. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Web-Based Route Optimization System For Logistic Using Agglomerative Clustering And Genetic Algorithm by Tan, Chee Kuan

    Published 2020
    “…Thus, a web-based route optimization is proposed with the objectives of developing a system that is able to find the shortest route to deliver. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8

    Development of a Web Access Control Technique Based User Access Behavior by Abdelrahman, Selmaelsheikh

    Published 2004
    “…This thesis discusses about designs and develops techniques and algorithms for performing web access control. The major objective of the proposed technique referred to as a Secure Web Access Control (SWAC) is to provide mechanisms for control web access based on user access behavior. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    ScholarsAid: a personalized scholarship web application based on web scraping/ Muhammad Nur Haqeem Sulaiman and Norhasliza Ahmad by Sulaiman, Muhammad Nur Haqeem, Ahmad, Norhasliza

    Published 2023
    “…The web application offers functionality for students to search and filter scholarships to suit their preferences or needs and the most relevant scholarships are provided based on matching algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Grid portal technology for web based education of parallel computing courses, applications and researches by Alias, Norma, Islam, Md. Rajibul, Mydin, Suhaimi, Hamzah, Norhafiza, Safiza Abd. Ghaffar, Zarith, Satam, Noriza, Darwis, Roziha

    Published 2009
    “…The increasing needs of remote and easy-to-access material, growing the aspirations in the development of a web-based service that is easily reached by potential users and easily maintain and update by administrator. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Sports tournament scheduling using genetic algorithm / Hafeezur Syakir Abdul Motok@Mohd Ridzuan by Abdul Motok@Mohd Ridzuan, Hafeezur Syakir

    Published 2020
    “…These steps are repeat until a condition satisfied. The system uses the Rapid Application Development (RAD) methodology in system development and will be operate on a web-based platform. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Modifying iEclat algo ithm for infrequent patterns mining by Julaily Aida, Jusoh, Mustafa, Man

    Published 2018
    “…A few parts of this algorithm need a modification to assure that it is suitable for mining infrequent pattern. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Malaysian license plate recognition system using Convolutional Neural Network (CNN) on web application / Nur Farahana Mahmud by Mahmud, Nur Farahana

    Published 2022
    “…The objectives of this research are to develop a Malaysian license plate recognition system using a Convolutional Neural Network (CNN) on a web application and evaluate the performance of the system based on accuracy and loss values. …”
    Get full text
    Get full text
    Student Project
  16. 16

    Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli by Dzulkifli, Muhammad Zulhilmie

    Published 2021
    “…The main goal of this study is to create an online food ordering app using the corresponding Boyer-Moore string matching algorithm. The application evaluation process is carried out by the developer's functionality test to ensure that there are no unnecessary issues in this app, especially in the main feature. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Job recruiting system using sorting Algorithm / Adi Asyraf Ayob by Ayob, Adi Asyraf

    Published 2020
    “…The purpose of this project is to develop a web-based job recruiting system with implementation of sorting algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Task scheduling in cloud computing using hybrid genetic algorithm and bald eagle search (GA-BES) by Kamal Khairi Supaprhman

    Published 2022
    “…The natural evolution optimization algorithm which is genetic algorithm can be improve by combining the nature meta-heuristic algorithms which is bald eagle search to improve the makespan of genetic algorithm using cloudsim that need to be implement on the eclipse platform. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  19. 19
  20. 20

    Efficient prime-based method for interactive mining of frequent patterns. by Mohammad Hossein, Nadimi Shahraki, Mustapha, Norwati, Sulaiman, Md. Nasir, Mamat, Ali

    Published 2011
    “…This is because the appropriate value depends on the type of application and expectation of the user. Moreover, in some real-time applications such as web mining and e-business, finding new correlations between patterns by changing the minimum support threshold is needed. …”
    Get full text
    Get full text
    Article