Search Results - (( _ application learning algorithm ) OR ( web applications need algorithm ))

Refine Results
  1. 1
  2. 2

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…This paper is written to present one of such algorithms to prevent SOA attacks on RESTful web services along the discussion on the obtained results of the conducted proof-of-concept on the real-time SOA environment. …”
    Get full text
    Get full text
    Article
  3. 3

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…This paper is written to present one of such algorithms to prevent SOA attacks on RESTful web services along the discussion on the obtained results of the conducted proof-of-concept on the real-time SOA environment. …”
    Get full text
    Get full text
    Article
  4. 4

    Grid portal technology for web based education of parallel computing courses, applications and researches by Alias, Norma, Islam, Md. Rajibul, Mydin, Suhaimi, Hamzah, Norhafiza, Safiza Abd. Ghaffar, Zarith, Satam, Noriza, Darwis, Roziha

    Published 2009
    “…This paper proposes the web service education technology for postgraduate parallel computing course, e-learning students, real-time solutions and for supervising projects related to the application of parallel computing, that focuses on the fundamental principles to parallel computer architecture, multimedia, communication cost, master-worker model, parallel algorithm, web services and performance evaluations. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Malaysian license plate recognition system using Convolutional Neural Network (CNN) on web application / Nur Farahana Mahmud by Mahmud, Nur Farahana

    Published 2022
    “…Nowadays, there are numerous license plate recognition systems that have been developed and analysed effectively by previous researchers using different machine learning algorithms. However, according to a recent study, ANN algorithms require a huge amount of training data while BPFFNN algorithms only have an average success rate of 70% in recognizing all the characters. …”
    Get full text
    Get full text
    Student Project
  6. 6

    Exploring nexus of social media algorithms, content creators, and gender bias: a systematic literature review by Lou, Shijun, Adzharuddin, Nor Azura, Syed Zainudin, Sharifah Sofiah, Omar, Siti Zobidah

    Published 2024
    “…The review synthesizes diverse theoretical approaches and models, offering comprehensive insights into the complex nexus of algorithms, gender bias, and content creators. The application of varied research methodologies, including experiments, surveys, and content analyses, facilitates a thorough examination of algorithmic impacts. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim by Ibrahim, Mohd Faisal

    Published 2017
    “…Second, network aware applications architecture for E-Learning system was also proposed to dynamically adjust the users' demand based on network resources. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Intent-IQ: customer’s reviews intent recognition using random forest algorithm by Mazlan, Nur Farahnisrin, Ibrahim Teo, Noor Hasimah

    Published 2025
    “…Two machine learning model is chosen to build the classification models which are Random Forest (RF) algorithm and Multinomial Naïve Bayes (MNB) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10
  11. 11

    Facial recognition attendance system by Lew, Tian Pei

    Published 2023
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12

    Job-Applicant matchmaking system using natural language processing by Wooi, Zhuang Ru

    Published 2023
    “…This system uses natural language processing (NLP) techniques to analyse job descriptions and candidate resumes, and machine learning algorithms to recommend the most suitable candidate to a job opening, and vice versa. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13

    Prototype development of Web AI-based decision support system: insights and recommendations for satellite anomaly identification by Mutholib, Abdul, Abdul Rahim, Nadirah, Gunawan, Teddy Surya

    Published 2025
    “…A detailed literature review highlights the current state of satellite anomaly identification and the application of the Web AI-based DSS in various fields. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14

    Text Extraction Algorithm for Web Text Classification by Theab, Mustafa Muwafak

    Published 2010
    “…A text extraction prototype is built using Visual C# 2008 to validate the algorithm. It is a windows application mixed with web connection protocol. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Future Trend of Artificial Intelligence and Stock Market: A Comprehensive Bibliometric Analysis by Abdul Hayy Haziq, Mohamad, Rossazana, Ab Rahim, Norlina, Kadri

    Published 2025
    “…Artificial intelligence (AI) has revolutionized stock market research, offering innovative solutions for predictive modeling, algorithmic trading, and financial decision-making. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17
  18. 18
  19. 19

    Web Usage Mining Using GSP Algorithm: A Study on Sultanah Bahiyah Library Online Databases by Hazzaimeh, Yousef Abd-AlMohdi

    Published 2008
    “…Application of data mining to the World Wide Web referred as Web mining is at the cross road of research from several research communities which can be divided into three branches: Web Content Mining, Web Structure Mining and Web Usage Mining. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Development of a Web Access Control Technique Based User Access Behavior by Abdelrahman, Selmaelsheikh

    Published 2004
    “…Previous studies have not yet designed such a system that is reliable enough for such critical applications. This thesis discusses about designs and develops techniques and algorithms for performing web access control. …”
    Get full text
    Get full text
    Thesis