Search Results - (( web application ((swarm algorithm) OR (_ algorithm)) ) OR ( its application based algorithm ))
Search alternatives:
- application based »
- web application »
- swarm algorithm »
- its application »
-
1
Quantum Particle Swarm Optimization Technique for Load Balancing in Cloud Computing
Published 2013“…Performance of the QPSO technique based on many heuristic algorithms it is comprised the following steps. …”
Get full text
Thesis -
2
Marine Predator Algorithm and Related Variants: A Systematic Review
Published 2025“…The Marine Predators Algorithm (MPA) is classified under swarm intelligence methods based on its type of inspiration. …”
Get full text
Get full text
Article -
3
Marine Predator Algorithm and Related Variants: A Systematic Review
Published 2025“…—The Marine Predators Algorithm (MPA) is classified under swarm intelligence methods based on its type of inspiration. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Intelligent Web caching using neurocomputing and particle swarm optimization algorithm
Published 2008Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
Get full text
Get full text
Thesis -
6
Efficient DNS based Load Balancing for Bursty Web Application Traffic
Published 2012“…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
Get full text
Get full text
Get full text
Article -
7
-
8
-
9
A Hybrid Approach For Web Search Result Clustering Based On Genetic Algorithm With K-means
Published 2024Get full text
journal::journal article -
10
Web Based Supervisor Supervisee Project Matching System
Published 2010Get full text
Get full text
Get full text
Thesis -
11
Optimal Long-Term Hydro Generation Scheduling of Small Hydropower Plant (SHP) using Metaheuristic Algorithm in Himreen Lake Dam
Published 2017Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Modifying iEclat algorithm for infrequent patterns mining
Published 2018“…This paper proposes an enhancement algorithm based on iEclat algorithms for mining infrequent pattern.…”
Get full text
Get full text
Conference or Workshop Item -
13
Web-Based Route Optimization System For Logistic Using Agglomerative Clustering And Genetic Algorithm
Published 2020“…This system will first cluster those addresses based on the number of trucks involved and then perform the route optimization algorithm to suggest the shortest route to the user. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm
Published 2022“…Furthermore, CloudSim simulator will be used to evaluate the performance of this algorithm. The result of the algorithm performance will be appeared in web application system. …”
Get full text
Get full text
Get full text
Academic Exercise -
15
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…The rapid growth of Web 2.0 applications, such as blogs and social networks creates rich online information and provides various new sources of knowledge. …”
Get full text
Get full text
Thesis -
16
A survey on QoS requirements based on particle swarm optimization scheduling techniques for workflow scheduling in cloud computing
Published 2020“…This paper surveys scheduling algorithms based on particle swarm optimization (PSO). …”
Get full text
Get full text
Get full text
Article -
17
-
18
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…This SOA implementation does not possess adequate security solutions within it, and its security is completely dependent on network/transport layer security that is obsolete owing to latest web technologies such as Web 2.0 and its upgraded version, Web 3.0. …”
Get full text
Get full text
Article -
19
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…This SOA implementation does not possess adequate security solutions within it, and its security is completely dependent on network/transport layer security that is obsolete owing to latest web technologies such as Web 2.0 and its upgraded version, Web 3.0. …”
Get full text
Get full text
Article -
20
