Search Results - (( web application ((a algorithm) OR (new algorithm)) ) OR ( _ selection based algorithm ))
Search alternatives:
- web application »
- selection based »
- new algorithm »
- a algorithm »
-
1
A new ant based rule extraction algorithm for web classification
Published 2011“…Web documents contain enormous number of attributes as compared to other type of data. Ant-Miner algorithm is also still lacking in efficiency, accuracy and rule simplicity because of the local minima problem.Therefore, the Ant-Miner algorithm needs to be improved by taking into consideration of the accuracy and rule simplicity criteria so that it could be used to classify Web documents data sets or any large data sets.The best attribute selection method for Web texts categorization is the combination of correlation-based evaluation with random search as the search method.However, this attribute selection method will not give the best performance in attributes reduction. …”
Get full text
Get full text
Get full text
Get full text
Monograph -
2
Genetic Algorithm for Web Data Mining
Published 2001“…This study used a prototype program based on genetic algorithm to manipulate the initial set of data. …”
Get full text
Get full text
Project Paper Report -
3
Efficient DNS based Load Balancing for Bursty Web Application Traffic
Published 2012“…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
Get full text
Get full text
Get full text
Article -
4
Adaptive System State Based Load Balancing For Web Application Server Cluster Of Heterogeneous Performance Nodes
Published 2013“…This research is to propose a new efficient DNS-based load balancing algorithms that can solve a sudden increase of demand for service requests when they are applied to a local Domain Name Service (DNS) server for Web based applications and selected services. …”
Get full text
Get full text
Get full text
Thesis -
5
DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS
Published 2012“…The four prime aspects of this work are: firstly, a model of the grid scheduling problem for dynamic grid computing environment; secondly, development of a new web based simulator (SyedWSim), enabling the grid users to conduct a statistical analysis of grid workload traces and provides a realistic basis for experimentation in resource allocation and job scheduling algorithms on a grid; thirdly, proposal of a new grid resource allocation method of optimal computational cost using synthetic and real workload traces with respect to other allocation methods; and finally, proposal of some new job scheduling algorithms of optimal performance considering parameters like waiting time, turnaround time, response time, bounded slowdown, completion time and stretch time. …”
Get full text
Get full text
Thesis -
6
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…As a result, 16 permissions and 31 API calls that are most related with mobile botnet have been extracted using feature selection and later classified and tested using machine learning algorithms. …”
Proceedings Paper -
7
Job recruiting system using sorting Algorithm / Adi Asyraf Ayob
Published 2020“…The purpose of this project is to develop a web-based job recruiting system with implementation of sorting algorithm. …”
Get full text
Get full text
Thesis -
8
Multi selection control algorithm in examination invigilation management system (ExIMS) for exchanging invigilation duties among invigilators at UiTM Pulau Pinang branch / Jamal Ot...
Published 2021“…This system has been developed to control and cross check the request of invigilation duties exchanged using the algorithm named multi selection control. The algorithm could avoid any conflicts or anomalies that could happen after the exchange of duty has been made. …”
Get full text
Get full text
Get full text
Article -
9
Multi selection control algorithm in examination invigilation management system (ExIMS) for exchanging invigilation duties among invigilators at UiTM Pulau Pinang branch / Jamal Ot...
Published 2021“…This system has been developed to control and cross check the request of invigilation duties exchanged using the algorithm named multi selection control. The algorithm could avoid any conflicts or anomalies that could happen after the exchange of duty has been made. …”
Get full text
Get full text
Get full text
Article -
10
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…In this modern era of enterprise computing, the enterprise application integration (EAI) is a well-known industry-recognized architectural principle that is built based on loosely coupled application architecture, where service-oriented architecture (SOA) is the architectural pattern for the implementation of EAI, whose computational elements are called as â��services.â�� Though SOA can be implemented in a wide range of technologies, the web services implementation of SOA becomes the current selective choice due to its simplicity that works on basic Internet protocols. …”
Get full text
Get full text
Article -
11
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…In this modern era of enterprise computing, the enterprise application integration (EAI) is a well-known industry-recognized architectural principle that is built based on loosely coupled application architecture, where service-oriented architecture (SOA) is the architectural pattern for the implementation of EAI, whose computational elements are called as â��services.â�� Though SOA can be implemented in a wide range of technologies, the web services implementation of SOA becomes the current selective choice due to its simplicity that works on basic Internet protocols. …”
Get full text
Get full text
Article -
12
Use of web page credibility information in increasing the accuracy of web-based question answering systems / Asad Ali Shah
Published 2017“…This research proposes a credibility assessment algorithm for evaluating Web pages and using their credibility score for ranking answers in Web-based QA systems. …”
Get full text
Get full text
Get full text
Thesis -
13
User recommendation algorithm in social tagging system based on hybrid user trust
Published 2013“…Experimental results show that the hybrid method outperforms the traditional CF algorithm. In addition, it indicated that the hybrid method give more accurate recommendation than the existing CF based on user trust.…”
Get full text
Get full text
Get full text
Article -
14
Danger theory inspired artificial immune system for pattern recognition
Published 2007“…Numerous AIS-based applications have been discovered such as anomaly detection system and user-preference based web contents applications of which possess pattern recognition ability. …”
Get full text
Get full text
Research Report -
15
A knowledge based system for automatic classification of web pages
Published 2006“…The paper describes design and implementation of a new knowledge based system for Automatic Information Retrieval DataBase (AIRDB).AIRDB helps the end-user to cluster and classify web pages on the basis of information filtering combined with an Artificial Neural Network (ANN).The classification depends mainly on keyword indexes.A large sample set consists of 11043 web pages of several formats are collected automatically and randomly from various resources.The AIRDB feature selection algorithm is summarized.The feature selection depends upon stemming words of web page. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
New species orchid recognition system using convolutional neural network / Annisa Atikah Mohd Fadzil and Itaza Afiani Mohtar
Published 2021“…This project is to prove that the concept of new orchid species recognition can be done. The web application that created using HTML and Flask was able to recognize new species based on existing species. …”
Get full text
Get full text
Get full text
Article -
17
Network routing by mobile agents for image retrieval using fuzzy genetic algorithms
Published 2005“…The GA will be used to select the best routes that will be used by mobile agents to retrieve query datasets in a very short time. …”
Get full text
Get full text
Monograph -
18
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…Whereas the process of examining through the web pages, retrieving and searching the relevant data in a liTML page, and selecting the best satisfying data are based on the features and operations of the Genetic Algorithms.…”
Get full text
Get full text
Thesis -
19
Sony applicant recruitment system using fuzzy logic / Nik Zurifa Nabilah Zulkifli
Published 2022“…Fuzzy Logic algorithms have adapted to fit a wide range of uses. …”
Get full text
Get full text
Thesis -
20
Document ranking using information quality criteria in weblog search engine
Published 2013“…The presented framework rank Weblogs and posts based on the selected information quality criteria. …”
Get full text
Get full text
Thesis
