Search Results - (( based application ((_ algorithm) OR (new algorithm)) ) OR ( web application among algorithm ))

Refine Results
  1. 1
  2. 2

    Content-based recommender system for an academic social network / Vala Ali Rohani by Vala Ali, Rohani

    Published 2014
    “…In this study, a new algorithm is proposed to represent an enhanced version of content-based recommender systems by utilizing social networking features. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Adaptive System State Based Load Balancing For Web Application Server Cluster Of Heterogeneous Performance Nodes by Lu, Chin Mei

    Published 2013
    “…This research is to propose a new efficient DNS-based load balancing algorithms that can solve a sudden increase of demand for service requests when they are applied to a local Domain Name Service (DNS) server for Web based applications and selected services. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment by Perumal, Thinagaran

    Published 2011
    “…By inheriting the capabilities of XML SOAP technology and Web Services, three new algorithms based on Event-Condition-Action (ECA) paradigm have been developed to facilitate efficient interoperation of the heterogeneous subsystems. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A New Mobile Botnet Classification based on Permission and API Calls by Yusof, M, Saudi, MM, Ridzuan, F

    Published 2024
    “…Therefore, this paper presents a new mobile botnet classification based on permission and Application Programming Interface (API) calls in the smartphone. …”
    Proceedings Paper
  6. 6
  7. 7

    Multi selection control algorithm in examination invigilation management system (ExIMS) for exchanging invigilation duties among invigilators at UiTM Pulau Pinang branch / Jamal Ot... by Othman, Jamal, Syed Abdullah, Sharifah Sarimah, Samsudin, Norshuhada, Wan Mohd Rosly, Wan Nur Shaziayani

    Published 2021
    “…Nevertheless, despite the excellent planning of invigilation duties assignment, it cannot make everybody satisfied. Thus, a web-based application system named Examination Invigilation Management Systems (ExIMS) has been developed using the System Development Life Cycle (SDLC) waterfall model methodology to meet the need of invigilation duties exchanged among invigilators or applicants. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Multi selection control algorithm in examination invigilation management system (ExIMS) for exchanging invigilation duties among invigilators at UiTM Pulau Pinang branch / Jamal Ot... by Othman, Jamal, Syed Abdullah, Sharifah Sarimah, Samsudin, Norshuhada, Wan Mohd Rosly, Wan Nur Shaziayani

    Published 2021
    “…Nevertheless, despite the excellent planning of invigilation duties assignment, it cannot make everybody satisfied. Thus, a web-based application system named Examination Invigilation Management Systems (ExIMS) has been developed using the System Development Life Cycle (SDLC) waterfall model methodology to meet the need of invigilation duties exchanged among invigilators or applicants. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10
  11. 11

    A Requirement Model For Online Web-Based Car Loan Management System For UUM Bursary by Alkhaldi, Ayman Nader Abdellatif

    Published 2008
    “…This research introduces a prototype "Web Based Car Loan Management System" to help in solving the problems or the difficulties of the traditional system (manual system), the study will use the methodology for this study is based on the general methodology in research design, because it is have the logical phases that used to develop a prototype for car loan management web based system and algorithm was developed to help facilitate decision making of the car loan process. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14
  15. 15

    Data hiding mobile application by using encryption and decryption / Nuha Bakizah Mohd Asri by Mohd Asri, Nuha Bakizah

    Published 2021
    “…Numerous data security and hiding algorithms have been developed in the last decade. Online attacks have increased to a large extent nowadays and the most common attack among them is data abuse . …”
    Get full text
    Get full text
    Student Project
  16. 16
  17. 17
  18. 18

    Network monopoly / Tan Kean Yeap by Tan , Kean Yeap

    Published 2002
    “…Moreover, because of the expanding memory anda processing power of these computers, users can put the machine to work on new kinds of applications and functions. Accordingly, the pressure from the users of these systems for ways to communicate among all these machines is irresistible. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Multi-population Genetic Algorithm for Rich Vehicle Routing Problems by Agany Manyiel, Joseph Mabor

    Published 2020
    “…Results from the experiments show that MPGA-RVRP performs better compared to benchmark, Multi-objective Genetic Algorithm (MOGA). A web-based logistic sys�tem has also been developed as use case for MPGA-RVRP.…”
    Get full text
    Get full text
    Final Year Project
  20. 20