Search Results - (( based application _ algorithm ) OR ( ((web application) OR (its application)) out algorithm ))
Search alternatives:
- web application »
- its application »
- out algorithm »
-
1
A web-based implementation of k-means algorithms
Published 2022“…The project was planned using the Kanban development methodology, and was built using HTML, CSS, JavaScript, Django, NumPy and pandas. The completed web application is then hosted on Heroku. k-luster allows users to upload their own data set, or choose from one of three samples if they just want to try out the application. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…The rapid growth of Web 2.0 applications, such as blogs and social networks creates rich online information and provides various new sources of knowledge. …”
Get full text
Get full text
Thesis -
3
A web usage mining approach based on LCS algorithm in online predicting recommendation systems
Published 2008“…To provide online prediction efficiently, we advance an architecture for online predicting in Web Usage Mining system and propose a novel approach based on LCS algorithm for classifying user navigation patterns for predicting users' future requests. …”
Get full text
Get full text
Article -
4
-
5
Intelligent cooperative web caching policies for media objects based on decision tree supervised machine learning algorithm
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Human health status IoT device using data optimization algorithm / Albin Lemuel Kushan ... [et al.]
Published 2021“…This project aims to produce a device that can be used to identify the current health status of a person using sensor and a data optimization algorithm. Furthermore, this project uses CT-UNO (Arduino Uno) microcontroller as its base together with the LM-35 Body Temperature sensor and the Pulse Sensor for reading heart rate, and a web system to manage the data collected. …”
Get full text
Get full text
Book Section -
7
Web application vulnerabilities detection model
Published 2016“…The algorithm is used in order to match the defined criteria of each web vulnerability with the input information about web application. …”
Get full text
Get full text
Research Reports -
8
-
9
-
10
Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli
Published 2021“…The main goal of this study is to create an online food ordering app using the corresponding Boyer-Moore string matching algorithm. The application evaluation process is carried out by the developer's functionality test to ensure that there are no unnecessary issues in this app, especially in the main feature. …”
Get full text
Get full text
Thesis -
11
-
12
Optimal power flow using the Jaya algorithm
Published 2016“…Unlike other population-based optimization methods, no algorithm-particular controlling parameters are required for this algorithm. …”
Get full text
Get full text
Get full text
Article -
13
Real time traceability module for halal logistic transportation using GPS and geofence technique
Published 2016“…User will be notified by receiving an email, while the report current and past track can be viewed via web based visualization interface with Google Map as base map. …”
Get full text
Get full text
Thesis -
14
Malaysian license plate recognition system using Convolutional Neural Network (CNN) on web application / Nur Farahana Mahmud
Published 2022“…The objectives of this research are to develop a Malaysian license plate recognition system using a Convolutional Neural Network (CNN) on a web application and evaluate the performance of the system based on accuracy and loss values. …”
Get full text
Get full text
Student Project -
15
An Improved of Channel Allocation for WLAN Using Vertex Merge Algorithm
Published 2012Get full text
Get full text
Conference or Workshop Item -
16
Stroke-to-stroke matching in on-line signature verification
Published 2010Get full text
Get full text
Thesis -
17
-
18
-
19
Fsm-Based Enhanced March C- Algorithm For Memory Built-In Self-Test
Published 2017Get full text
Get full text
Thesis -
20
Enhanced Continuous Face Recognition Algorithm for Bandwidth Constrained Network in Real Time Application
Published 2023Conference Paper
