Search Results - (( web application ((new algorithm) OR (bat algorithm)) ) OR ( its application sensor algorithm ))
Search alternatives:
- application sensor »
- sensor algorithm »
- web application »
- its application »
- new algorithm »
- bat algorithm »
-
1
Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm
Published 2022“…This research will conduct comparison of hybrid Genetic Algorithm and Bat Algorithm (GA-BA) with Genetic Algorithm (GA) and Bat Algorithm (BA). …”
Get full text
Get full text
Get full text
Academic Exercise -
2
A new algorithm to measure relevance among Web pages
Published 2006“…This paper proposes a new algorithm to measure relevance among Web pages (RWP) using a hybrid method of hyperlink analysis and content analysis. …”
Get full text
Get full text
Get full text
Article -
3
Genetic Algorithm for Web Data Mining
Published 2001Get full text
Get full text
Project Paper Report -
4
Enhancement of stemming process for malay illicit web content
Published 2012Get full text
Get full text
Thesis -
5
Efficient DNS based Load Balancing for Bursty Web Application Traffic
Published 2012“…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
Get full text
Get full text
Get full text
Article -
6
-
7
Intelligent cooperative web caching policies for media objects based on decision tree supervised machine learning algorithm
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
8
A new ant based rule extraction algorithm for web classification
Published 2011Get full text
Get full text
Get full text
Get full text
Monograph -
9
-
10
-
11
-
12
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
Published 2024“…Cross-site scripting (XSS) vulnerabilities are a major security threat for both desktop and mobile web applications. They occur due to lack of proper verification of the user inputs, which enables hackers to inject and execute malicious scripts in the web pages of an application. …”
Get full text
Get full text
Get full text
Thesis -
13
-
14
Review paper on centroiding algorithm for lunar navigation
Published 2025Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
15
Enhancement Of Clustering Algorithm Using 3D Euclidean Distance To Improve Network Connectivity In Wireless Sensor Networks For Correlated Node Behaviours
Published 2024thesis::doctoral thesis -
16
-
17
On Clustering Algorithm Of Coverage Area Problems In Wireless Sensor Networks
Published 2024“…Wireless sensor networks (WSN) has applications in many areas such as in surveillance, healthcare, national security, military and environmental monitoring. …”
Article -
18
Mobile data gathering algorithms for wireless sensor networks
Published 2014“…These mobile elements will go to each transmission range of each respective sensor to upload its data. In this research, a Mobile Data Gathering based Network Layout (MDG-NL) algorithm is proposed. …”
Get full text
Get full text
Thesis -
19
-
20
