Search Results - (( _ application using algorithm ) OR ( web applications ((need algorithm) OR (new algorithm)) ))
Search alternatives:
- web applications »
- using algorithm »
- need algorithm »
- new algorithm »
-
1
A new ant based rule extraction algorithm for web classification
Published 2011Get full text
Get full text
Get full text
Get full text
Monograph -
2
Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment
Published 2011“…Besides, this algorithm provides home users or application developers to implement their own event operators with bespoke syntax for their application purpose by defining cross-events corresponding to the event operators. …”
Get full text
Get full text
Thesis -
3
Adopting Jaya Algorithm for Team Formation Problem
Published 2020“…This paper presents a simple and mighty metaheuristic algorithm, Jaya, which is applied to solve the team formation (TF) problem and it is a very fundamental problem in many databases and expert collaboration networks or web applications. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
5
Job recruiting system using sorting Algorithm / Adi Asyraf Ayob
Published 2020“…The sorting algorithm will assist the recruiters in selecting best job candidate by assigning score to each applicants and sort the applicant list by the finest score value. …”
Get full text
Get full text
Thesis -
6
Image steganography using web application / Nor Arzami Othman ... [et al.]
Published 2023“…The web application supports encoding and decoding images for concealing data in images. …”
Get full text
Get full text
Get full text
Article -
7
Efficient prime-based method for interactive mining of frequent patterns.
Published 2011“…This is because the appropriate value depends on the type of application and expectation of the user. Moreover, in some real-time applications such as web mining and e-business, finding new correlations between patterns by changing the minimum support threshold is needed. …”
Get full text
Get full text
Article -
8
A hybrid Method Of Centroid-Based Clustering And Meta-Heuristic For Personalized Web Search
Published 2024thesis::doctoral thesis -
9
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…This paper is written to present one of such algorithms to prevent SOA attacks on RESTful web services along the discussion on the obtained results of the conducted proof-of-concept on the real-time SOA environment. …”
Get full text
Get full text
Article -
10
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…This paper is written to present one of such algorithms to prevent SOA attacks on RESTful web services along the discussion on the obtained results of the conducted proof-of-concept on the real-time SOA environment. …”
Get full text
Get full text
Article -
11
-
12
Development of scalable video compression algorithm
Published 2011Get full text
Get full text
Get full text
Book Chapter -
13
A new algorithm to measure relevance among Web pages
Published 2006“…This paper proposes a new algorithm to measure relevance among Web pages (RWP) using a hybrid method of hyperlink analysis and content analysis. …”
Get full text
Get full text
Get full text
Article -
14
-
15
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
16
Multi selection control algorithm in examination invigilation management system (ExIMS) for exchanging invigilation duties among invigilators at UiTM Pulau Pinang branch / Jamal Ot...
Published 2021“…Nevertheless, despite the excellent planning of invigilation duties assignment, it cannot make everybody satisfied. Thus, a web-based application system named Examination Invigilation Management Systems (ExIMS) has been developed using the System Development Life Cycle (SDLC) waterfall model methodology to meet the need of invigilation duties exchanged among invigilators or applicants. …”
Get full text
Get full text
Get full text
Article -
17
Multi selection control algorithm in examination invigilation management system (ExIMS) for exchanging invigilation duties among invigilators at UiTM Pulau Pinang branch / Jamal Ot...
Published 2021“…Nevertheless, despite the excellent planning of invigilation duties assignment, it cannot make everybody satisfied. Thus, a web-based application system named Examination Invigilation Management Systems (ExIMS) has been developed using the System Development Life Cycle (SDLC) waterfall model methodology to meet the need of invigilation duties exchanged among invigilators or applicants. …”
Get full text
Get full text
Get full text
Article -
18
Text Extraction Algorithm for Web Text Classification
Published 2010“…A text extraction prototype is built using Visual C# 2008 to validate the algorithm. It is a windows application mixed with web connection protocol. …”
Get full text
Get full text
Get full text
Thesis -
19
Enhancement of stemming process for malay illicit web content
Published 2012Get full text
Get full text
Thesis -
20
Grocery Recommender System / Naajihah Mustapa
Published 2022“…To understand how the recommender system work, a preliminary study helps to understand more and choose the best algorithm to be implemented into the application. A collaborative filtering algorithm is selected. …”
Get full text
Get full text
Thesis
