Search Results - (( developing effective using algorithm ) OR ( web application optimized algorithm ))
Search alternatives:
- optimized algorithm »
- effective using »
- using algorithm »
- web application »
-
1
DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS
Published 2012“…The issue is not only to develop new algorithms, but also to evaluate them on an experimental computational grid, using synthetic and real workload traces, along with the other existing job scheduling algorithms. …”
Get full text
Get full text
Thesis -
2
An optimized attack tree model for security test case planning and generation
Published 2018“…By leveraging on the optimized attack tree algorithm used in this research work, the threat model produces efficient test plans from which adequate test cases are derived to ensure a secured web application is designed, implemented and deployed. …”
Get full text
Get full text
Article -
3
Optimization of the PID-PD parameters of the overhead crane control system by using PSO algorithm
Published 2019“…New time-domain performance criterion function is used in particle swarm optimization (PSO) algorithm for the tuning of the PID-PD controller rather than the general performance criteria using error of the system. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
A comparative analysis of anti-phishing website techniques: identifying optimal approaches to enhance cybersecurity
Published 2023“…The research consists of analysing the characteristics of phishing websites, extracting their essential features using the wrapper method, and classifying websites as phishing or legitimate using supervised and unsupervised learning algorithms. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Use of web page credibility information in increasing the accuracy of web-based question answering systems / Asad Ali Shah
Published 2017“…This research proposes a credibility assessment algorithm for evaluating Web pages and using their credibility score for ranking answers in Web-based QA systems. …”
Get full text
Get full text
Get full text
Thesis -
6
The conceptual framework of knowledge of large scale and incomplete graphs of skyline queries optimization using machine learning
Published 2025“…Then, propose an method for handling skyline queries within an incomplete graph database followed by designing and implementing a model to evaluate the efficiency and effectiveness of the proposed approaches. The preliminary results using the K means Clustering Algorithm showed that the conceptual framework successfully grouped similar data points, facilitating the identification of skyline points. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
Implementation of machine learning techniques with big data and IoT to create effective prediction models for health informatics
Published 2024“…In the reduction phase, the optimal features are selected with theaid of the developed Hybrid Flower Pollination Bumblebees Optimization Algorithm (HFPBOA). …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Intelligent Web caching using neurocomputing and particle swarm optimization algorithm
Published 2008Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Web based applications for energy management system incorporated network reconfiguration using genetic algorithm / Wan Adnan Wan
Published 2006“…This research was involved with the development of Web Based Applications for Energy Management System for providing Web application system, Web monitoring System and Genetic algorithm Based Network Reconfiguration Technique for loss minimization in the UiTM Distribution System. …”
Get full text
Get full text
Thesis -
10
A framework of rough cultural algorithms in optimizing mobile web caching performance
Published 2007“…Hence, the goal of this study is to propose Rough Set (RS) as a knowledge representation for uncertainty in data of client behavior and mobile event specification with resource dependencies to reduce latency by prefetching selected resources to resolve the problems in handling dynamic web pages. Simultaneously, Cultural Algorithms (CA) will be exploited to optimize the performance of proxy caching in accumulating the knowledge between each generation. …”
Get full text
Get full text
Article -
11
-
12
-
13
-
14
-
15
Web-Based Route Optimization System For Logistic Using Agglomerative Clustering And Genetic Algorithm
Published 2020“…This system will first cluster those addresses based on the number of trucks involved and then perform the route optimization algorithm to suggest the shortest route to the user. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Web Usage Mining for UUM Learning Care Using Association Rules
Published 2004“…Application of data mining techniques to the World Wide Web referred as Web mining where this term has been used in three distint ways; Web Content Mining, Web Structure Mining and Web Usage Mining. …”
Get full text
Get full text
Get full text
Thesis -
17
Web usage mining for UUM learning care using association rules
Published 2004“…Application of data milling techniques to the World Wide Web referred as Web mining where this term has been used in three distinct ways; Web Content Mining, Web Structure Mining and Web Usage Mining. …”
Get full text
Get full text
Thesis -
18
Human health status IoT device using data optimization algorithm / Albin Lemuel Kushan ... [et al.]
Published 2021“…The data that will be collected are the body temperature, heart rate and the health survey, all the data will run through a data optimization algorithm to produce a more accurate result. …”
Get full text
Get full text
Book Section -
19
Design and implementation of a private and public key crypto processor for next-generation it security applications
Published 2006“…This paper presents the design and implementation of a crypto processor, a special-purpose embedded system optimized for the execution of cryptographic algorithms in hardware. …”
Get full text
Get full text
Get full text
Article -
20
A malicious URLs detection system using optimization and machine learning classifiers
Published 2020“…The bio-inspired algorithm: particle swarm optimization (PSO) is used to optimized URLs features. …”
Get full text
Get full text
Get full text
Article
