Search Results - (( web application new algorithm ) OR ( its application ((need algorithm) OR (bees algorithm)) ))*

Refine Results
  1. 1

    Efficient DNS based Load Balancing for Bursty Web Application Traffic by Chin, Mei Lu, Chong, Eng Tan, Mohamad Imran, Bin Bandan

    Published 2012
    “…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Home buyer assistant using artificial bee colony algorithm / Muhammad Izzat Azri Azman by Azman, Muhammad Izzat Azri

    Published 2017
    “…This project used Artificial Bee Colony Algorithms (ABC) by adapting the food foraging behaviour of bee in honey bee and find a suitable house for home buyer based on their requirement. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Artificial Bee Colony Algorithm for Pairwise Test Generation by Alazzawi, Ammar K., Homaid, Ameen A. Ba, Alomoush, Alaa A., Alsewari, Abdulrahman A.

    Published 2017
    “…PABC progresses as a means to achieve the effective use of the artificial bee colony algorithm for pairwise testing reduction.…”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment by Perumal, Thinagaran

    Published 2011
    “…Besides, this algorithm provides home users or application developers to implement their own event operators with bespoke syntax for their application purpose by defining cross-events corresponding to the event operators. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…This SOA implementation does not possess adequate security solutions within it, and its security is completely dependent on network/transport layer security that is obsolete owing to latest web technologies such as Web 2.0 and its upgraded version, Web 3.0. …”
    Get full text
    Get full text
    Article
  7. 7

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…This SOA implementation does not possess adequate security solutions within it, and its security is completely dependent on network/transport layer security that is obsolete owing to latest web technologies such as Web 2.0 and its upgraded version, Web 3.0. …”
    Get full text
    Get full text
    Article
  8. 8

    Adopting Jaya Algorithm for Team Formation Problem by Kader, Md. Abdul, Kamal Z., Zamli

    Published 2020
    “…To evaluate the efficiency of the Jaya Algorithm (JA) against another metaheuristic algorithm, Sine-Cosine Algorithm (SCA), both algorithms are tested and assessed for the TF problem solution using an ACM dataset containing experts and their skills. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10

    Acoustic emission partial discharge localization in oil based on artificial bee colony by Lim, Zhi Yang, Azis, Norhafiz, Mohd Hashim, Ahmad Hafiz, Mohd Radzi, Mohd Amran, Norsahperi, Nor Mohd Haziq, Mohd Ariffin, Azrul

    Published 2025
    “…It is known that localization algorithms are among the factors that can affect PD localization accuracy, and the ongoing research in this area underscores the need for further advancements in this topic. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Efficient prime-based method for interactive mining of frequent patterns. by Mohammad Hossein, Nadimi Shahraki, Mustapha, Norwati, Sulaiman, Md. Nasir, Mamat, Ali

    Published 2011
    “…This is because the appropriate value depends on the type of application and expectation of the user. Moreover, in some real-time applications such as web mining and e-business, finding new correlations between patterns by changing the minimum support threshold is needed. …”
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Improved tree routing protocol in zigbee networks by Al-Harbawi, Mostafa Kamil Abdulhusain

    Published 2010
    “…ImpTR algorithm reduces the average end-to-end delay by (10-31) % which is the time needs to transmit packets between source and sink node, decrease the energy consumption from the whole network by (8-40) % , reduce the number of hops need to transmit data packets to sink node by (3-32)%, and increases the average throughput by (4-65) % which is average number of bits receive in sink node per second.…”
    Get full text
    Get full text
    Thesis
  14. 14

    Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm by Muhammad Syahril Mohamad Sainal

    Published 2022
    “…Genetic algorithm was widely used because of its accuracy and simplicity. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  15. 15

    A review of training methods of ANFIS for applications in business and economic by Mohd Salleh, Mohd Najib, Hussain, Kashif

    Published 2016
    “…Other than that, Genetic Algorithm (GA), Firefly Algorithm (FA), Ant Bee Colony (ABC) optimization methods have been employed for effective training of ANFIS networks when solving various problems in the field of business and finance.…”
    Get full text
    Get full text
    Article
  16. 16

    A review of training methods of ANFIS for applications in business and economics by Mohd Salleh, Mohd Najib, Hussain, Kashif

    Published 2016
    “…Other than that, Genetic Algorithm (GA), Firefly Algorithm (FA), Ant Bee Colony (ABC) optimization methods have been employed for effective training of ANFIS networks when solving various problems in the field of business and finance.…”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18
  19. 19
  20. 20