Search Results - (( web application new algorithm ) OR ( based applications means algorithm ))*
Search alternatives:
- based applications »
- applications means »
- web application »
- application new »
- means algorithm »
- new algorithm »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
2
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
-
4
Development of Web services fuzzy quality models using data clustering approach
Published 2014“…The work implies potential new findings on fuzzy-based web services' applications, mainly in reducing computational complexity. …”
Get full text
Get full text
Article -
5
A new algorithm to measure relevance among Web pages
Published 2006“…This paper proposes a new algorithm to measure relevance among Web pages (RWP) using a hybrid method of hyperlink analysis and content analysis. …”
Get full text
Get full text
Get full text
Article -
6
The conceptual framework of knowledge of large scale and incomplete graphs of skyline queries optimization using machine learning
Published 2025“…Most recently, graphs have become prevalent data structures to model complex information networks for various real-life contemporary applications such as social networks, knowledge bases, pattern recognition, and the World Wide Web. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
Genetic Algorithm for Web Data Mining
Published 2001Get full text
Get full text
Project Paper Report -
8
Enhancement of stemming process for malay illicit web content
Published 2012Get full text
Get full text
Thesis -
9
Dynamic feature selection model for adaptive cross site scripting attack detection using developed multi-agent deep Q learning model
Published 2023“…One of these most serious and frequent web application attacks is a Cross-site scripting attack (XSS). …”
Get full text
Get full text
Get full text
Article -
10
Experiment with Text Summarization as a Positive Hierarchical Fuzzy Logic Ranking Indicator for Domain Specific Retrieval of Malay Translated Hadith
Published 2024journal::journal article -
11
Efficient DNS based Load Balancing for Bursty Web Application Traffic
Published 2012“…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
Get full text
Get full text
Get full text
Article -
12
Intelligent cooperative web caching policies for media objects based on decision tree supervised machine learning algorithm
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
13
A new ant based rule extraction algorithm for web classification
Published 2011Get full text
Get full text
Get full text
Get full text
Monograph -
14
-
15
-
16
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
Published 2024“…Cross-site scripting (XSS) vulnerabilities are a major security threat for both desktop and mobile web applications. They occur due to lack of proper verification of the user inputs, which enables hackers to inject and execute malicious scripts in the web pages of an application. …”
Get full text
Get full text
Get full text
Thesis -
17
-
18
-
19
Comparison of attribute selection methods for web texts categorization
Published 2010Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…This paper is written to present one of such algorithms to prevent SOA attacks on RESTful web services along the discussion on the obtained results of the conducted proof-of-concept on the real-time SOA environment. …”
Get full text
Get full text
Article
