Search Results - (( web application model algorithm ) OR ( web application ((new algorithm) OR (_ algorithm)) ))*
Search alternatives:
- application model »
- web application »
- model algorithm »
- new algorithm »
-
1
Efficient DNS based Load Balancing for Bursty Web Application Traffic
Published 2012“…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
Get full text
Get full text
Get full text
Article -
2
Dynamic modeling by usage data for personalization systems
Published 2009Get full text
Get full text
Conference or Workshop Item -
3
Car dealership web application
Published 2022“…Thus, explainable AI and AI monitoring become the integral components for any new development of commercial applications, including used car dealership web application. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project is developed by using Rapid Application Development methodology as it is the model that is most suitable for developing this web tools. …”
Get full text
Get full text
Thesis -
5
-
6
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…This paper is written to present one of such algorithms to prevent SOA attacks on RESTful web services along the discussion on the obtained results of the conducted proof-of-concept on the real-time SOA environment. …”
Get full text
Get full text
Article -
7
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…This paper is written to present one of such algorithms to prevent SOA attacks on RESTful web services along the discussion on the obtained results of the conducted proof-of-concept on the real-time SOA environment. …”
Get full text
Get full text
Article -
8
A Data Mining Approach to Construct Graduates Employability Model in Malaysia
Published 2024Get full text
journal::journal article -
9
DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS
Published 2012“…Thus, overall aim of this research is to introduce new grid scheduling algorithms for resource allocation as well as for job scheduling for enabling a highly efficient and effective utilization of the resources in executing various applications. …”
Get full text
Get full text
Thesis -
10
Fake news detection: A machine learning approach
Published 2021“…Finally, a web application was developed to deploy the trained model. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
-
12
Efficient prime-based method for interactive mining of frequent patterns.
Published 2011“…This is because the appropriate value depends on the type of application and expectation of the user. Moreover, in some real-time applications such as web mining and e-business, finding new correlations between patterns by changing the minimum support threshold is needed. …”
Get full text
Get full text
Article -
13
-
14
Combination of GREEN and SHRed AQM for short-lived traffic
Published 2008Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
16
New species orchid recognition system using convolutional neural network / Annisa Atikah Mohd Fadzil and Itaza Afiani Mohtar
Published 2021“…This project is to prove that the concept of new orchid species recognition can be done. The web application that created using HTML and Flask was able to recognize new species based on existing species. …”
Get full text
Get full text
Get full text
Article -
17
Development of Web services fuzzy quality models using data clustering approach
Published 2014“…For future work, the fuzzy quality models will be employed in web services' QoS monitoring application. …”
Get full text
Get full text
Article -
18
Web application vulnerabilities detection model
Published 2016“…The research will be carried out by using design string matching algorithm. The algorithm is used in order to match the defined criteria of each web vulnerability with the input information about web application. …”
Get full text
Get full text
Research Reports -
19
-
20
