Search Results - (( web application a algorithm ) OR ( its ((application need) OR (application use)) algorithm ))*

Refine Results
  1. 1

    Web Usage Mining Using GSP Algorithm: A Study on Sultanah Bahiyah Library Online Databases by Hazzaimeh, Yousef Abd-AlMohdi

    Published 2008
    “…In this study web usage mining use sequential pattern technique with GSP algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4

    Image steganography using web application / Nor Arzami Othman ... [et al.] by Othman, Nor Arzami, Shariffudin, Muhammad Nur Harith, Osman, Mohd Nizam, Sedek, Khairul Anwar

    Published 2023
    “…The web application proved to be a versatile and practical tool with applications in various fields such as cryptography and digital forensics. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Modifying iEclat algorithm for infrequent patterns mining by Julaily Aida, J., Mustafa, M.

    Published 2018
    “…A few parts of this algorithm need a modification to assure that it is suitable for mining infrequent pattern. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun by Kok , Sun Sun

    Published 2000
    “…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…In this modern era of enterprise computing, the enterprise application integration (EAI) is a well-known industry-recognized architectural principle that is built based on loosely coupled application architecture, where service-oriented architecture (SOA) is the architectural pattern for the implementation of EAI, whose computational elements are called as â��services.â�� Though SOA can be implemented in a wide range of technologies, the web services implementation of SOA becomes the current selective choice due to its simplicity that works on basic Internet protocols. …”
    Get full text
    Get full text
    Article
  8. 8

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…In this modern era of enterprise computing, the enterprise application integration (EAI) is a well-known industry-recognized architectural principle that is built based on loosely coupled application architecture, where service-oriented architecture (SOA) is the architectural pattern for the implementation of EAI, whose computational elements are called as â��services.â�� Though SOA can be implemented in a wide range of technologies, the web services implementation of SOA becomes the current selective choice due to its simplicity that works on basic Internet protocols. …”
    Get full text
    Get full text
    Article
  9. 9

    Efficient DNS based Load Balancing for Bursty Web Application Traffic by Chin, Mei Lu, Chong, Eng Tan, Mohamad Imran, Bin Bandan

    Published 2012
    “…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Adopting Jaya Algorithm for Team Formation Problem by Kader, Md. Abdul, Kamal Z., Zamli

    Published 2020
    “…This paper presents a simple and mighty metaheuristic algorithm, Jaya, which is applied to solve the team formation (TF) problem and it is a very fundamental problem in many databases and expert collaboration networks or web applications. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Web-Based Route Optimization System For Logistic Using Agglomerative Clustering And Genetic Algorithm by Tan, Chee Kuan

    Published 2020
    “…Thus, a web-based route optimization is proposed with the objectives of developing a system that is able to find the shortest route to deliver. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12

    Modifying iEclat algo ithm for infrequent patterns mining by Julaily Aida, Jusoh, Mustafa, Man

    Published 2018
    “…A few parts of this algorithm need a modification to assure that it is suitable for mining infrequent pattern. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14

    Task scheduling in cloud computing using hybrid genetic algorithm and bald eagle search (GA-BES) by Kamal Khairi Supaprhman

    Published 2022
    “…The genetic algorithm was widely used because of its accuracy and simplicity. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  15. 15

    Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges by Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni

    Published 2014
    “…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17
  18. 18

    Efficient prime-based method for interactive mining of frequent patterns. by Mohammad Hossein, Nadimi Shahraki, Mustapha, Norwati, Sulaiman, Md. Nasir, Mamat, Ali

    Published 2011
    “…This is because the appropriate value depends on the type of application and expectation of the user. Moreover, in some real-time applications such as web mining and e-business, finding new correlations between patterns by changing the minimum support threshold is needed. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20