Search Results - (( its application using algorithm ) OR ( web applications ((out algorithm) OR (ant algorithm)) ))
Search alternatives:
- web applications »
- its application »
- using algorithm »
- out algorithm »
- ant algorithm »
-
1
Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm
Published 2022“…The result of the algorithm performance will be appeared in web application system. …”
Get full text
Get full text
Get full text
Academic Exercise -
2
Task scheduling in cloud computing using hybrid genetic algorithm and bald eagle search (GA-BES)
Published 2022“…The genetic algorithm was widely used because of its accuracy and simplicity. …”
Get full text
Get full text
Get full text
Academic Exercise -
3
Web Usage Mining Using GSP Algorithm: A Study on Sultanah Bahiyah Library Online Databases
Published 2008“…In this study web usage mining use sequential pattern technique with GSP algorithm. …”
Get full text
Get full text
Get full text
Thesis -
4
A new ant based rule extraction algorithm for web classification
Published 2011Get full text
Get full text
Get full text
Get full text
Monograph -
5
Human health status IoT device using data optimization algorithm / Albin Lemuel Kushan ... [et al.]
Published 2021“…This project aims to produce a device that can be used to identify the current health status of a person using sensor and a data optimization algorithm. …”
Get full text
Get full text
Book Section -
6
Quantum Particle Swarm Optimization Technique for Load Balancing in Cloud Computing
Published 2013“…Cloud Computing systems are widely applied in many fields such as communication data management, web application, network monitoring, financial management and so on. …”
Get full text
Thesis -
7
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010Get full text
Get full text
Undergraduates Project Papers -
8
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010Get full text
Get full text
Undergraduates Project Papers -
9
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…The rapid growth of Web 2.0 applications, such as blogs and social networks creates rich online information and provides various new sources of knowledge. …”
Get full text
Get full text
Thesis -
10
Comparison of attribute selection methods for web texts categorization
Published 2010Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Defect green coffee bean detection using image recognition and supervised learning
Published 2022“…The model was integrated as web application with Flask where user can upload the image and the system will return result with precision and prediction. …”
Get full text
Get full text
Get full text
Academic Exercise -
12
Face recognition and identification system (FaceRec) / Khew Jye Huei
Published 2004“…Face recognition is a technique to identify an individual by his/her physical characteristic and has been of interest to a growing number of researchers due to its applications on security. Several different algorithms have been proposed for computer recognition of human faces. …”
Get full text
Get full text
Thesis -
13
Car license plate detection method for Malaysian plates-styles by using a web camera
Published 2010“…Recently, license plate detection has been used in many applications especially in transportation systems. …”
Get full text
Get full text
Get full text
Article -
14
Real time traceability module for halal logistic transportation using GPS and geofence technique
Published 2016“…The existing geofence technique was upgraded by integrating spatial, temporal and speed rule in the ray casting algorithm used for this technique. As soon as the vehicle is on the move, the tracker will be stimulated, and the stopping location of the vehicle is being inspected, whether it is within the geofence area or otherwise. …”
Get full text
Get full text
Thesis -
15
Explore Ease
Published 2024“…The sophisticated search algorithm of the application makes customized vacation planning easier by allowing searches by category, date range, map location, and special needs like the number of guests, rooms, and bathrooms. …”
Get full text
Get full text
Final Year Project -
16
A review of slicing techniques in software engineering
Published 2015“…Process of model based slicing is utilized to extract the desired lump out of slice diagram. This specific survey focuses on slicing techniques in the fields of numerous programing paradigms like web applications, object oriented, and components based. …”
Get full text
Get full text
Get full text
Proceeding Paper -
17
A web-based implementation of k-means algorithms
Published 2022“…The project was planned using the Kanban development methodology, and was built using HTML, CSS, JavaScript, Django, NumPy and pandas. The completed web application is then hosted on Heroku. k-luster allows users to upload their own data set, or choose from one of three samples if they just want to try out the application. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
A modified π rough k-means algorithm for web page recommendation system
Published 2018“…Web page recommendation system is an application of Web Usage Mining (WUM) approach, which specializes in predicting the user next browsing activity in real-time Web for personalized recommendations. …”
Get full text
Get full text
Get full text
Thesis -
19
Computerized welding process selection and parameter determination
Published 2010“…On the other hand, a prototype of the proposed system was developed and deployed by using Oracle Application Express version 3.2 as a web page developer tool and Oracle Database 11g as data storage application. …”
Get full text
Get full text
Thesis -
20
Web application vulnerabilities detection model
Published 2016“…The algorithm is used in order to match the defined criteria of each web vulnerability with the input information about web application. …”
Get full text
Get full text
Research Reports
