Search Results - (( web application ((a algorithm) OR (new algorithm)) ) OR ( its relation based algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The proposed method, XiFLEX has been implemented using two different techniques (java based & XQuery) and compared with the original FLEX algorithm in its basic implementation and the Apriori algorithm for frequent patterns generation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    A New Mobile Botnet Classification based on Permission and API Calls by Yusof, M, Saudi, MM, Ridzuan, F

    Published 2024
    “…Currently, mobile botnet attacks have shifted from computers to smartphones due to its functionality, ease to exploit, and based on financial intention. …”
    Proceedings Paper
  3. 3

    A new algorithm to measure relevance among Web pages by Sadi, M.S., Rahman, M.M. Hafizur, Horiguchi, Susumu

    Published 2006
    “…This paper proposes a new algorithm to measure relevance among Web pages (RWP) using a hybrid method of hyperlink analysis and content analysis. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Marine Predator Algorithm and Related Variants: A Systematic Review by Philibus, Emmanuel, Mohd Zain, Azlan, Prasetya, Didik Dwi, Bahari, Mahadi, Yusup, Norfadzlan, Abdul Jalil, Rozita, Abdul Majid, Mazlina, A Samah, Azurah

    Published 2025
    “…The study expounded the classical MPA’s workflow. It also unveiled a steady upward trend in the use of the algorithm. …”
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Efficient DNS based Load Balancing for Bursty Web Application Traffic by Chin, Mei Lu, Chong, Eng Tan, Mohamad Imran, Bin Bandan

    Published 2012
    “…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9
  10. 10

    The conceptual framework of knowledge of large scale and incomplete graphs of skyline queries optimization using machine learning by Noor, Ubair, Hassan, Raini, Dwi Handayani, Dini Oktarina

    Published 2025
    “…Ever since its introduction into the database community, skyline queries have been widely adopted in a range of contemporary database applications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11
  12. 12
  13. 13

    Content-based recommender system for an academic social network / Vala Ali Rohani by Vala Ali, Rohani

    Published 2014
    “…In this study, a new algorithm is proposed to represent an enhanced version of content-based recommender systems by utilizing social networking features. …”
    Get full text
    Get full text
    Thesis
  14. 14

    DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS by MEHMOOD SHAH, SYED NASIR

    Published 2012
    “…Thus, overall aim of this research is to introduce new grid scheduling algorithms for resource allocation as well as for job scheduling for enabling a highly efficient and effective utilization of the resources in executing various applications. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Adaptive System State Based Load Balancing For Web Application Server Cluster Of Heterogeneous Performance Nodes by Lu, Chin Mei

    Published 2013
    “…This research is to propose a new efficient DNS-based load balancing algorithms that can solve a sudden increase of demand for service requests when they are applied to a local Domain Name Service (DNS) server for Web based applications and selected services. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project is developed by using Rapid Application Development methodology as it is the model that is most suitable for developing this web tools. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms by Hydara, Isatou

    Published 2024
    “…Cross-site scripting (XSS) vulnerabilities are a major security threat for both desktop and mobile web applications. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20