Search Results - (( web applications ((new algorithm) OR (_ algorithm)) ) OR ( some location based algorithm ))

Refine Results
  1. 1
  2. 2

    Named entity recognition using a new fuzzy support vector machine. by Mansouri, Alireza, Affendy, Lilly Suriani, Mamat, Ali

    Published 2008
    “…Some of the Machine learning algorithms used in NER methods are, support vector machine(SVM), Hidden Markov Model, Maximum Entropy Model (MEM) and Decision Tree. …”
    Get full text
    Get full text
    Article
  3. 3

    A new algorithm to measure relevance among Web pages by Sadi, M.S., Rahman, M.M. Hafizur, Horiguchi, Susumu

    Published 2006
    “…This paper proposes a new algorithm to measure relevance among Web pages (RWP) using a hybrid method of hyperlink analysis and content analysis. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5
  6. 6

    Efficient DNS based Load Balancing for Bursty Web Application Traffic by Chin, Mei Lu, Chong, Eng Tan, Mohamad Imran, Bin Bandan

    Published 2012
    “…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  12. 12

    Content-based recommender system for an academic social network / Vala Ali Rohani by Vala Ali, Rohani

    Published 2014
    “…The rapid growth of Web 2.0 applications, such as blogs and social networks creates rich online information and provides various new sources of knowledge. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A Web-Based Wound Information and Recovery Prediction System by Ting, Chris Lik Yong

    Published 2020
    “…The web application allows the doctors or patients to access and document the wound assessments whenever and wherever using any platform that can access the web. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  14. 14

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project is developed by using Rapid Application Development methodology as it is the model that is most suitable for developing this web tools. …”
    Get full text
    Get full text
    Thesis
  15. 15

    DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS by MEHMOOD SHAH, SYED NASIR

    Published 2012
    “…Thus, overall aim of this research is to introduce new grid scheduling algorithms for resource allocation as well as for job scheduling for enabling a highly efficient and effective utilization of the resources in executing various applications. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Adaptive System State Based Load Balancing For Web Application Server Cluster Of Heterogeneous Performance Nodes by Lu, Chin Mei

    Published 2013
    “…This research is to propose a new efficient DNS-based load balancing algorithms that can solve a sudden increase of demand for service requests when they are applied to a local Domain Name Service (DNS) server for Web based applications and selected services. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms by Hydara, Isatou

    Published 2024
    “…Cross-site scripting (XSS) vulnerabilities are a major security threat for both desktop and mobile web applications. They occur due to lack of proper verification of the user inputs, which enables hackers to inject and execute malicious scripts in the web pages of an application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment by Perumal, Thinagaran

    Published 2011
    “…By inheriting the capabilities of XML SOAP technology and Web Services, three new algorithms based on Event-Condition-Action (ECA) paradigm have been developed to facilitate efficient interoperation of the heterogeneous subsystems. …”
    Get full text
    Get full text
    Thesis
  20. 20