Search Results - (( ((_ application) OR (web application)) a algorithm ) OR ( vr application testing algorithm ))
Search alternatives:
- application testing »
- testing algorithm »
- web application »
- vr application »
- a algorithm »
-
1
Virtual reality in algorithm programming course: practicality and implications for college students
Published 2024“…The product developed is in the form of a VR application that presents learning by having a variety of learning styles. …”
Get full text
Get full text
Get full text
Article -
2
Text Extraction Algorithm for Web Text Classification
Published 2010“…It is a windows application mixed with web connection protocol. …”
Get full text
Get full text
Get full text
Thesis -
3
Design of experiments meets immersive environment: optimising eating atmosphere using artificial neural network
Published 2022“…Moreover, virtual reality (VR) technology, which has become increasingly accessible, sophisticated, and widespread over the past years, presents a new way to study scenarios which may be otherwise too expensive/implausible to test in real life this includes delivering immersive environment. …”
Get full text
Get full text
Article -
4
A new algorithm to measure relevance among Web pages
Published 2006“…This paper proposes a new algorithm to measure relevance among Web pages (RWP) using a hybrid method of hyperlink analysis and content analysis. …”
Get full text
Get full text
Get full text
Article -
5
Web based applications for energy management system incorporated network reconfiguration using genetic algorithm / Wan Adnan Wan
Published 2006“…The Web Application System program is designed for the client to configure a system (e.g calculates a load flow). …”
Get full text
Get full text
Thesis -
6
Integrating Interactive Multimedia Objects in Mobile Augmented Reality for Sarawak Tourism
Published 2018“…As for interaction module, technique of color picking algorithm was applied. Henceforth, a prototype of mobile Sarawak Tourism system was developed to evaluate the multimedia based modules functionalities testing; text, animations, audio, video, 2D/3D object interactions. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
A web-based implementation of k-means algorithms
Published 2022“…Furthermore, the web application could save the users’ past work, so that they may resume their work at a later time without skipping a beat.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
Get full text
Get full text
Thesis -
9
A modified π rough k-means algorithm for web page recommendation system
Published 2018“…In order to tackle above problem, a modified algorithm for Web page recommendation is proposed. …”
Get full text
Get full text
Get full text
Thesis -
10
A technique of dispatching algorithms for web-server cluster
Published 2011Get full text
Working Paper -
11
Web Usage Mining for UUM Learning Care Using Association Rules
Published 2004“…Application of data mining techniques to the World Wide Web referred as Web mining where this term has been used in three distint ways; Web Content Mining, Web Structure Mining and Web Usage Mining. …”
Get full text
Get full text
Get full text
Thesis -
12
Web-Application for securing message using Steganography with LSB Algorithm and Hybrid Encryption / Muhammad Khairul Amin Mohd Nai and Siti Rahayu Abdul Aziz
Published 2021“…Web-Application for Securing Message using Steganography with LSB Algorithm and Hybrid Encryption is a web application that encrypt the messages user input and hide it in an image file to give an utmost security for the messages to be delivered and received. …”
Get full text
Get full text
Get full text
Book Section -
13
Web-Application for securing message using Steganography with LSB Algorithm and Hybrid Encryption / Muhammad Khairul Amin Mohd Nai and Siti Rahayu Abdul Aziz
Published 2021“…Web-Application for Securing Message using Steganography with LSB Algorithm and Hybrid Encryption is a web application that encrypt the messages user input and hide it in an image file to give an utmost security for the messages to be delivered and received. …”
Get full text
Get full text
Get full text
Book Section -
14
Web Usage Mining Using GSP Algorithm: A Study on Sultanah Bahiyah Library Online Databases
Published 2008“…Application of data mining to the World Wide Web referred as Web mining is at the cross road of research from several research communities which can be divided into three branches: Web Content Mining, Web Structure Mining and Web Usage Mining. …”
Get full text
Get full text
Get full text
Thesis -
15
A web usage mining approach based on LCS algorithm in online predicting recommendation systems
Published 2008“…Web Usage Mining (WUM) systems are specifically designed to carry out this task by analyzing the data representing usage data about a particular Web site. …”
Get full text
Get full text
Article -
16
Web application vulnerabilities detection model
Published 2016“…The algorithm is used in order to match the defined criteria of each web vulnerability with the input information about web application. …”
Get full text
Get full text
Research Reports -
17
Efficient DNS based Load Balancing for Bursty Web Application Traffic
Published 2012“…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
Get full text
Get full text
Get full text
Article -
18
-
19
CLIMCAL DECISION SI]PBORT SYATEM FOR HEMATOLOGICAL DISI'Of,DTN$
Published 2012Get full text
Get full text
Final Year Project -
20
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
Published 2024“…Cross-site scripting (XSS) vulnerabilities are a major security threat for both desktop and mobile web applications. …”
Get full text
Get full text
Get full text
Thesis
