Search Results - (( web application ((need algorithm) OR (bee algorithm)) ) OR ( _ application during algorithm ))*

Refine Results
  1. 1

    Task scheduling in cloud computing environment using hybrid genetic algorithm and artificial bee colony by Mohd Izuddin Sipluk

    Published 2022
    “…In this project, a comparative evaluation of selected algorithms is done to ascertain their applicability, practicality, and adaptability in a cloud scenario. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  2. 2

    Efficient DNS based Load Balancing for Bursty Web Application Traffic by Chin, Mei Lu, Chong, Eng Tan, Mohamad Imran, Bin Bandan

    Published 2012
    “…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    A web usage mining approach based on LCS algorithm in online predicting recommendation systems by Jalali, Mehrdad, Mustapha, Norwati, Sulaiman, Md. Nasir, Mamat, Ali

    Published 2008
    “…Online prediction is one Web Usage Mining application. However, the accuracy of the prediction and classification in the current architecture of predicting users' future requests systems can not still satisfy users especially in huge Web sites. …”
    Get full text
    Get full text
    Article
  4. 4

    Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm by Muhammad Syahril Mohamad Sainal

    Published 2022
    “…Furthermore, CloudSim simulator will be used to evaluate the performance of this algorithm. The result of the algorithm performance will be appeared in web application system. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  5. 5

    Soap performance enhancement for high volume messaging / Ali Baba Dauda by Ali Baba , Dauda

    Published 2018
    “…To achieve this aim, LZ77 compression algorithm is modified to encode more symbols. The algorithm is then integrated into two Web services with HTTP and JMS bindings. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Sports tournament scheduling using genetic algorithm / Hafeezur Syakir Abdul Motok@Mohd Ridzuan by Abdul Motok@Mohd Ridzuan, Hafeezur Syakir

    Published 2020
    “…The system uses the Rapid Application Development (RAD) methodology in system development and will be operate on a web-based platform. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Efficient prime-based method for interactive mining of frequent patterns. by Mohammad Hossein, Nadimi Shahraki, Mustapha, Norwati, Sulaiman, Md. Nasir, Mamat, Ali

    Published 2011
    “…This is because the appropriate value depends on the type of application and expectation of the user. Moreover, in some real-time applications such as web mining and e-business, finding new correlations between patterns by changing the minimum support threshold is needed. …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Multi selection control algorithm in examination invigilation management system (ExIMS) for exchanging invigilation duties among invigilators at UiTM Pulau Pinang branch / Jamal Ot... by Othman, Jamal, Syed Abdullah, Sharifah Sarimah, Samsudin, Norshuhada, Wan Mohd Rosly, Wan Nur Shaziayani

    Published 2021
    “…Nevertheless, despite the excellent planning of invigilation duties assignment, it cannot make everybody satisfied. Thus, a web-based application system named Examination Invigilation Management Systems (ExIMS) has been developed using the System Development Life Cycle (SDLC) waterfall model methodology to meet the need of invigilation duties exchanged among invigilators or applicants. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Multi selection control algorithm in examination invigilation management system (ExIMS) for exchanging invigilation duties among invigilators at UiTM Pulau Pinang branch / Jamal Ot... by Othman, Jamal, Syed Abdullah, Sharifah Sarimah, Samsudin, Norshuhada, Wan Mohd Rosly, Wan Nur Shaziayani

    Published 2021
    “…Nevertheless, despite the excellent planning of invigilation duties assignment, it cannot make everybody satisfied. Thus, a web-based application system named Examination Invigilation Management Systems (ExIMS) has been developed using the System Development Life Cycle (SDLC) waterfall model methodology to meet the need of invigilation duties exchanged among invigilators or applicants. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Enhanced 3D terrain visualization process using game engine by Mohd Hafiz, Mahayudin

    Published 2018
    “…This is due to the compression and the need for Unity3D web player to make contact with the Unity server for authentication and also for visualization during online. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Prototype development of Web AI-based decision support system: insights and recommendations for satellite anomaly identification by Mutholib, Abdul, Abdul Rahim, Nadirah, Gunawan, Teddy Surya

    Published 2025
    “…A detailed literature review highlights the current state of satellite anomaly identification and the application of the Web AI-based DSS in various fields. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  13. 13

    Text Extraction Algorithm for Web Text Classification by Theab, Mustafa Muwafak

    Published 2010
    “…A text extraction prototype is built using Visual C# 2008 to validate the algorithm. It is a windows application mixed with web connection protocol. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Employing Public Key Infrastructure to Encapsulate Messages During Transport Layer Security Handshake Procedure by Nayeem Ahmad, Khan, Adnan Shahid, Khan, Seleviawati, Tarmizi, Azlina, Ahmadi Julaihi, Zeeshan, Ahmad

    Published 2022
    “…The proposed method removes the need for credentials, including client-server certificates and client-server key exchange.…”
    Get full text
    Get full text
    Get full text
    Proceeding
  16. 16
  17. 17

    Web Usage Mining Using GSP Algorithm: A Study on Sultanah Bahiyah Library Online Databases by Hazzaimeh, Yousef Abd-AlMohdi

    Published 2008
    “…Application of data mining to the World Wide Web referred as Web mining is at the cross road of research from several research communities which can be divided into three branches: Web Content Mining, Web Structure Mining and Web Usage Mining. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Development of a Web Access Control Technique Based User Access Behavior by Abdelrahman, Selmaelsheikh

    Published 2004
    “…Previous studies have not yet designed such a system that is reliable enough for such critical applications. This thesis discusses about designs and develops techniques and algorithms for performing web access control. …”
    Get full text
    Get full text
    Thesis
  19. 19

    ScholarsAid: a personalized scholarship web application based on web scraping/ Muhammad Nur Haqeem Sulaiman and Norhasliza Ahmad by Sulaiman, Muhammad Nur Haqeem, Ahmad, Norhasliza

    Published 2023
    “…The web application offers functionality for students to search and filter scholarships to suit their preferences or needs and the most relevant scholarships are provided based on matching algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20