Search Results - (( web application using algorithm ) OR ( based applications new algorithm ))*
Search alternatives:
- based applications »
- applications new »
- web application »
- using algorithm »
- new algorithm »
-
1
Genetic Algorithm for Web Data Mining
Published 2001Get full text
Get full text
Project Paper Report -
2
Enhancement of stemming process for malay illicit web content
Published 2012Get full text
Get full text
Thesis -
3
-
4
A new ant based rule extraction algorithm for web classification
Published 2011Get full text
Get full text
Get full text
Get full text
Monograph -
5
-
6
Intelligent cooperative web caching policies for media objects based on decision tree supervised machine learning algorithm
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…The rapid growth of Web 2.0 applications, such as blogs and social networks creates rich online information and provides various new sources of knowledge. …”
Get full text
Get full text
Thesis -
8
The shortest route of the potential companies for internship using Dijkstra’s Algorithm / Mohamad Khairul Ikhwan Mohd Radzi
Published 2017“…This application also should change into dynamic form so that this application can add and make the same process for the new register company.…”
Get full text
Get full text
Thesis -
9
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project is developed by using Rapid Application Development methodology as it is the model that is most suitable for developing this web tools. …”
Get full text
Get full text
Thesis -
10
A Data Mining Approach to Construct Graduates Employability Model in Malaysia
Published 2024Get full text
journal::journal article -
11
DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS
Published 2012“…The issue is not only to develop new algorithms, but also to evaluate them on an experimental computational grid, using synthetic and real workload traces, along with the other existing job scheduling algorithms. …”
Get full text
Get full text
Thesis -
12
A hybrid Method Of Centroid-Based Clustering And Meta-Heuristic For Personalized Web Search
Published 2024thesis::doctoral thesis -
13
Dynamic modeling by usage data for personalization systems
Published 2009Get full text
Get full text
Conference or Workshop Item -
14
-
15
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…Therefore, this paper presents a new mobile botnet classification based on permission and Application Programming Interface (API) calls in the smartphone. …”
Proceedings Paper -
16
Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment
Published 2011“…By inheriting the capabilities of XML SOAP technology and Web Services, three new algorithms based on Event-Condition-Action (ECA) paradigm have been developed to facilitate efficient interoperation of the heterogeneous subsystems. …”
Get full text
Get full text
Thesis -
17
Efficient prime-based method for interactive mining of frequent patterns.
Published 2011“…This is because the appropriate value depends on the type of application and expectation of the user. Moreover, in some real-time applications such as web mining and e-business, finding new correlations between patterns by changing the minimum support threshold is needed. …”
Get full text
Get full text
Article -
18
A new split based searching for exact pattern matching for natural texts
Published 2018“…Exact pattern matching algorithms are popular and used widely in several applications, such as molecular biology, text processing, image processing, web search engines, network intrusion detection systems and operating systems. …”
Get full text
Get full text
Article -
19
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
20
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article
