Search Results - (( web location model algorithm ) OR ( web application ((_ algorithm) OR (based algorithm)) ))*

Refine Results
  1. 1

    The application of firefly algorithm in an adaptive emergency evacuation centre management (AEECM) for dynamic relocation of flood victims by Che Pa, Noraziah, Hashim, Nor Laily, Yusof, Yuhanis, Hussain, Azham

    Published 2016
    “…This study undergoes two main phases; development of algorithm and models, and development of a web-based and mobile app.The proposed model operates using Firefly multi-objective optimization algorithm that creates an optimal schedule for the relocation of victims and resources for an evacuation centre.The proposed decision aid model and the adaptive system can be applied in supporting the National Security Council’s respond mechanisms for handling disaster management level II (State level) especially in providing better management of the flood evacuating centres.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Adaptive emergency evacuation centre management for dynamic relocation of flood victims using firefly algorithm by Che Pa, Noraziah, Hashim, Nor Laily, Yusof, Yuhanis, Hussain, Azham

    Published 2016
    “…This study undergoes two main phases; development of algorithm and models, and development of a web-based and mobile app. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Enhancing geographic coordinates representation standard for reverse geocoding web services by Al-Habshi, Mohammed Mustafa Abdulrahman

    Published 2018
    “…Reverse-geocoding is Location Base Services (LBS) that supports mobile and web applications. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Named entity recognition using a new fuzzy support vector machine. by Mansouri, Alireza, Affendy, Lilly Suriani, Mamat, Ali

    Published 2008
    “…Some of the Machine learning algorithms used in NER methods are, support vector machine(SVM), Hidden Markov Model, Maximum Entropy Model (MEM) and Decision Tree. …”
    Get full text
    Get full text
    Article
  6. 6

    Brain tumor image segmentation using deep learning approach by Darshan, Suresh

    Published 2022
    “…The proposed model is also deployed as a web application using Flask for public usage. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    A review of slicing techniques in software engineering by Shah, Asadullah, Raza, Ali, Hassan, Basri, Shah, Abdul Salam

    Published 2015
    “…Quite a large numbers of variants for the program slicing have been analyzed along with the algorithms to compute the slice. Model based slicing split the large architectures of software into smaller sub models during early stages of SDLC. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8

    Breast Cancer Diagnosis Using Neuro-CBR Approach by Norlia, Md. Yusof

    Published 2005
    “…The proposed system is developed in the web-based platform, so that it can be accessed anytime, anywhere regardless of the geographical location.…”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Web based applications for energy management system incorporated network reconfiguration using genetic algorithm / Wan Adnan Wan by Wan Chik, Wan Adnan

    Published 2006
    “…This research was involved with the development of Web Based Applications for Energy Management System for providing Web application system, Web monitoring System and Genetic algorithm Based Network Reconfiguration Technique for loss minimization in the UiTM Distribution System. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun by Kok , Sun Sun

    Published 2000
    “…Whereas the process of examining through the web pages, retrieving and searching the relevant data in a liTML page, and selecting the best satisfying data are based on the features and operations of the Genetic Algorithms.…”
    Get full text
    Get full text
    Thesis
  11. 11

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…Furthermore, the web application could save the users’ past work, so that they may resume their work at a later time without skipping a beat.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12
  13. 13
  14. 14

    Efficient DNS based Load Balancing for Bursty Web Application Traffic by Chin, Mei Lu, Chong, Eng Tan, Mohamad Imran, Bin Bandan

    Published 2012
    “…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Intelligent deep machine learning cyber phishing URL detection based on BERT features extraction by Muna Elsadig, Ashraf Osman Ibrahim Elsayed, Shakila Basheer, Manal Abdullah Alohali, Sara Alshunaifi, Haya Alqahtani, Nihal Alharbi, Wamda Nagmeldin

    Published 2022
    “…Enormous intelligent attacks are launched dynamically with the aim of tricking users into thinking they are accessing a reliable website or online application to acquire account information. Researchers in cyberspace are motivated to create intelligent models and offer secure services on the web as phishing grows more intelligent and malicious every day. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20

    A web usage mining approach based on LCS algorithm in online predicting recommendation systems by Jalali, Mehrdad, Mustapha, Norwati, Sulaiman, Md. Nasir, Mamat, Ali

    Published 2008
    “…To provide online prediction efficiently, we advance an architecture for online predicting in Web Usage Mining system and propose a novel approach based on LCS algorithm for classifying user navigation patterns for predicting users' future requests. …”
    Get full text
    Get full text
    Article