Search Results - (( web application ((a algorithm) OR (bat algorithm)) ) OR ( its selection based algorithm ))*
Search alternatives:
- web application »
- selection based »
- bat algorithm »
- its selection »
- a algorithm »
-
1
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…Whereas the process of examining through the web pages, retrieving and searching the relevant data in a liTML page, and selecting the best satisfying data are based on the features and operations of the Genetic Algorithms.…”
Get full text
Get full text
Thesis -
2
Efficient DNS based Load Balancing for Bursty Web Application Traffic
Published 2012“…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
Get full text
Get full text
Get full text
Article -
3
Web-Based Route Optimization System For Logistic Using Agglomerative Clustering And Genetic Algorithm
Published 2020“…This system enables the logistic company to arrange its route to deliver based on the number of trucks selected by the user. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…In this modern era of enterprise computing, the enterprise application integration (EAI) is a well-known industry-recognized architectural principle that is built based on loosely coupled application architecture, where service-oriented architecture (SOA) is the architectural pattern for the implementation of EAI, whose computational elements are called as â��services.â�� Though SOA can be implemented in a wide range of technologies, the web services implementation of SOA becomes the current selective choice due to its simplicity that works on basic Internet protocols. …”
Get full text
Get full text
Article -
5
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…In this modern era of enterprise computing, the enterprise application integration (EAI) is a well-known industry-recognized architectural principle that is built based on loosely coupled application architecture, where service-oriented architecture (SOA) is the architectural pattern for the implementation of EAI, whose computational elements are called as â��services.â�� Though SOA can be implemented in a wide range of technologies, the web services implementation of SOA becomes the current selective choice due to its simplicity that works on basic Internet protocols. …”
Get full text
Get full text
Article -
6
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…Currently, mobile botnet attacks have shifted from computers to smartphones due to its functionality, ease to exploit, and based on financial intention. …”
Proceedings Paper -
7
DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS
Published 2012“…The four prime aspects of this work are: firstly, a model of the grid scheduling problem for dynamic grid computing environment; secondly, development of a new web based simulator (SyedWSim), enabling the grid users to conduct a statistical analysis of grid workload traces and provides a realistic basis for experimentation in resource allocation and job scheduling algorithms on a grid; thirdly, proposal of a new grid resource allocation method of optimal computational cost using synthetic and real workload traces with respect to other allocation methods; and finally, proposal of some new job scheduling algorithms of optimal performance considering parameters like waiting time, turnaround time, response time, bounded slowdown, completion time and stretch time. …”
Get full text
Get full text
Thesis -
8
An Automated System For Classifying Conference Papers
Published 2021“…The project is also aimed to select the best classification model for the system, based on an empirical study. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm
Published 2022“…This research will conduct comparison of hybrid Genetic Algorithm and Bat Algorithm (GA-BA) with Genetic Algorithm (GA) and Bat Algorithm (BA). …”
Get full text
Get full text
Get full text
Academic Exercise -
10
New species orchid recognition system using convolutional neural network / Annisa Atikah Mohd Fadzil and Itaza Afiani Mohtar
Published 2021“…Orchid is famous for its variety and its beauty. Every year, about a hundred of new species names are published. …”
Get full text
Get full text
Get full text
Article -
11
Detection of SQL injection attack using machine learning
Published 2024“…Integrating this system into the backend of the web application server would augment the safety and security measures of the online application. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Permodelan Rangkaian Neural Buatan Untuk Penilaian Kendiri Teknologi Maklumat Guru Pelatih
Published 2001“…The performance of the selected model was reassessed and was found to be 96.77% accuracy in its prediction. …”
Get full text
Get full text
Get full text
Thesis -
13
A computational framework for predicting software quality-in-use from software reviews
Published 2015“…Software Quality-in-Use (QinU) lies in the eyes of its users. QinU has gained its importance in egovernment, mobile-based, and web applications. …”
Get full text
Get full text
Get full text
Thesis -
14
Dynamic feature selection model for adaptive cross site scripting attack detection using developed multi-agent deep Q learning model
Published 2023“…The proposed approach is a dynamic feature selection based on a deep Q-network multi-agent feature selection (DQN-MAFS) framework. …”
Get full text
Get full text
Get full text
Article -
15
Suspicious activities detection for anti-money laundering using machine learning techniques
Published 2025“…XGBoost is selected as the core detection engine due to its superior performance among five supervised machine learning algorithms tested: Random Forest, Naïve Bayes, Support Vector Machine and Artificial Neural Network. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
A phonetically rich and balanced lexical corpus using zipfian distribution for an under resourced language / Aminath Farshana
Published 2018“…In recent times, speech technology and its related applications are becoming a popular topic among researchers. …”
Get full text
Get full text
Get full text
Thesis -
17
3D documenatation of the petalaindera: Digital heritage preservation methods using 3D laser scanner and photogrammetry
Published 2018“…In recent years, however, the advent of computer vision (CV) algorithms make it possible to reconstruct 3D geometry of objects by using image sequences from digital cameras, which are then processed by web services and freeware applications. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
Effective keyword query structuring using NER for XML retrieval
Published 2015“…XKSS consists of two guidelines based on NER that help to resolve these ambiguities before converting the submitted query. …”
Get full text
Get full text
Article -
19
Smart student timetable planner
Published 2025“…Course data is managed in CSV format, parsed into JSON for fast processing, while sessionStorage and localStorage handle user data within active sessions. A Genetic Algorithm forms the core scheduling engine, generating optimized timetables that respect both hard constraints, such as avoiding clashes, and soft constraints, such as personal preferences.The final output of this project is a functional web-based timetable planner that successfully enhances scheduling efficiency, reduces the likelihood of errors, and improves the overall academic planning experience. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
3D documentation of the Petalaindera: digital heritage preservation methods using 3D laser scanner and photogrammetry
Published 2017“…In recent years, however, the advent of computer vision (CV) algorithms make it possible to reconstruct 3D geometry of objects by using image sequences from digital cameras, which are then processed by web services and freeware applications. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
