Search Results - (( using function based algorithm ) OR ( web application optimized algorithm ))
Search alternatives:
- optimized algorithm »
- web application »
- using function »
-
1
DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS
Published 2012“…The issue is not only to develop new algorithms, but also to evaluate them on an experimental computational grid, using synthetic and real workload traces, along with the other existing job scheduling algorithms. …”
Get full text
Get full text
Thesis -
2
Smart Routing For Solid Waste Collection
Published 2023“…Finally, the conclusion highlights the accomplishments of the project, including the successful development of the route optimization algorithm and the web-based application. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
3
Student-Class (SC) optimization system / Haifaa Mahfuzah Hazalin
Published 2020“…To solve the issue the Student-Class Optimization System had been developed by using optimization technique, specifically, is a Greedy Algorithm. …”
Get full text
Get full text
Thesis -
4
Optimizing the production of valuable metabolites using a hybrid of constraint-based model and machine learning algorithms : A review
Published 2023“…This review paper summarizes research on the hybrid of constraint-based models and machine learning algorithms in optimizing valuable metabolites. …”
Get full text
Get full text
Get full text
Article -
5
Use of web page credibility information in increasing the accuracy of web-based question answering systems / Asad Ali Shah
Published 2017“…This research proposes a credibility assessment algorithm for evaluating Web pages and using their credibility score for ranking answers in Web-based QA systems. …”
Get full text
Get full text
Get full text
Thesis -
6
A Method for Mapping XML DTD to Relational Schemas In The Presence Of Functional Dependencies
Published 2008“…The findings suggest that if one wants to use RDBMS to manage XML data, the mapping from XML document to relations must based be on functional dependency constraints.…”
Get full text
Get full text
Thesis -
7
-
8
Stock indicator scanner customization tool using deep reinforcement learning
Published 2022“…This project will deliver a web application with dynamic stock prediction model based on deep reinforcement learning or more particularly, Deep Q-Network (DQN) algorithm which enable input customization. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Impact of low-dose protocols on computed tomography of lung cancer screening on the intrinsic performance metrics: a phantom study
Published 2023“…We compared the noise power spectrum (NPS), target transfer function (TTF), and contrast-to-noise ratio (CNR) values for different IR algorithm levels in the low dose group for both acrylic and LDPE inserts. …”
Get full text
Get full text
Conference or Workshop Item -
10
Smart student timetable planner
Published 2025“…Course data is managed in CSV format, parsed into JSON for fast processing, while sessionStorage and localStorage handle user data within active sessions. A Genetic Algorithm forms the core scheduling engine, generating optimized timetables that respect both hard constraints, such as avoiding clashes, and soft constraints, such as personal preferences.The final output of this project is a functional web-based timetable planner that successfully enhances scheduling efficiency, reduces the likelihood of errors, and improves the overall academic planning experience. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Intelligent Web caching using neurocomputing and particle swarm optimization algorithm
Published 2008Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Web based applications for energy management system incorporated network reconfiguration using genetic algorithm / Wan Adnan Wan
Published 2006“…This research was involved with the development of Web Based Applications for Energy Management System for providing Web application system, Web monitoring System and Genetic algorithm Based Network Reconfiguration Technique for loss minimization in the UiTM Distribution System. …”
Get full text
Get full text
Thesis -
13
A framework of rough cultural algorithms in optimizing mobile web caching performance
Published 2007“…Hence, the goal of this study is to propose Rough Set (RS) as a knowledge representation for uncertainty in data of client behavior and mobile event specification with resource dependencies to reduce latency by prefetching selected resources to resolve the problems in handling dynamic web pages. Simultaneously, Cultural Algorithms (CA) will be exploited to optimize the performance of proxy caching in accumulating the knowledge between each generation. …”
Get full text
Get full text
Article -
14
-
15
Implementation of machine learning techniques with big data and IoT to create effective prediction models for health informatics
Published 2024“…In the reduction phase, the optimal features are selected with theaid of the developed Hybrid Flower Pollination Bumblebees Optimization Algorithm (HFPBOA). …”
Get full text
Get full text
Get full text
Get full text
Article -
16
-
17
Web-Based Route Optimization System For Logistic Using Agglomerative Clustering And Genetic Algorithm
Published 2020“…This system will first cluster those addresses based on the number of trucks involved and then perform the route optimization algorithm to suggest the shortest route to the user. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Web Usage Mining for UUM Learning Care Using Association Rules
Published 2004“…Application of data mining techniques to the World Wide Web referred as Web mining where this term has been used in three distint ways; Web Content Mining, Web Structure Mining and Web Usage Mining. …”
Get full text
Get full text
Get full text
Thesis -
19
An optimized attack tree model for security test case planning and generation
Published 2018“…By leveraging on the optimized attack tree algorithm used in this research work, the threat model produces efficient test plans from which adequate test cases are derived to ensure a secured web application is designed, implemented and deployed. …”
Get full text
Get full text
Article -
20
Web usage mining for UUM learning care using association rules
Published 2004“…Application of data milling techniques to the World Wide Web referred as Web mining where this term has been used in three distinct ways; Web Content Mining, Web Structure Mining and Web Usage Mining. …”
Get full text
Get full text
Thesis
