Search Results - (( its application using algorithm ) OR ( web applications ((out algorithm) OR (ant algorithm)) ))

Refine Results
  1. 1

    Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm by Muhammad Syahril Mohamad Sainal

    Published 2022
    “…The result of the algorithm performance will be appeared in web application system. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  2. 2

    Task scheduling in cloud computing using hybrid genetic algorithm and bald eagle search (GA-BES) by Kamal Khairi Supaprhman

    Published 2022
    “…The genetic algorithm was widely used because of its accuracy and simplicity. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  3. 3

    Web Usage Mining Using GSP Algorithm: A Study on Sultanah Bahiyah Library Online Databases by Hazzaimeh, Yousef Abd-AlMohdi

    Published 2008
    “…In this study web usage mining use sequential pattern technique with GSP algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Human health status IoT device using data optimization algorithm / Albin Lemuel Kushan ... [et al.] by Kushan, Albin Lemuel, Anuar, Muhammad Hazwan, Mohd Supir, Mohd Hafifi, Ahmad Fadzil, Ahmad Firdaus, Zolkeplay, Anwar Farhan

    Published 2021
    “…This project aims to produce a device that can be used to identify the current health status of a person using sensor and a data optimization algorithm. …”
    Get full text
    Get full text
    Book Section
  6. 6

    Quantum Particle Swarm Optimization Technique for Load Balancing in Cloud Computing by Elrasheed Ismail, Sultan

    Published 2013
    “…Cloud Computing systems are widely applied in many fields such as communication data management, web application, network monitoring, financial management and so on. …”
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    Content-based recommender system for an academic social network / Vala Ali Rohani by Vala Ali, Rohani

    Published 2014
    “…The rapid growth of Web 2.0 applications, such as blogs and social networks creates rich online information and provides various new sources of knowledge. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Defect green coffee bean detection using image recognition and supervised learning by Shafian Izan Sofian

    Published 2022
    “…The model was integrated as web application with Flask where user can upload the image and the system will return result with precision and prediction. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  12. 12

    Face recognition and identification system (FaceRec) / Khew Jye Huei by Khew , Jye Huei

    Published 2004
    “…Face recognition is a technique to identify an individual by his/her physical characteristic and has been of interest to a growing number of researchers due to its applications on security. Several different algorithms have been proposed for computer recognition of human faces. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Car license plate detection method for Malaysian plates-styles by using a web camera by Al-Ghaili, Abbas Mohammed Ali, Mashohor, Syamsiah, Ramli, Abdul Rahman, Ismail, Alyani

    Published 2010
    “…Recently, license plate detection has been used in many applications especially in transportation systems. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Real time traceability module for halal logistic transportation using GPS and geofence technique by Mohamad, Maizatul Akma

    Published 2016
    “…The existing geofence technique was upgraded by integrating spatial, temporal and speed rule in the ray casting algorithm used for this technique. As soon as the vehicle is on the move, the tracker will be stimulated, and the stopping location of the vehicle is being inspected, whether it is within the geofence area or otherwise. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Explore Ease by Rahman, Mohammad Miskatur

    Published 2024
    “…The sophisticated search algorithm of the application makes customized vacation planning easier by allowing searches by category, date range, map location, and special needs like the number of guests, rooms, and bathrooms. …”
    Get full text
    Get full text
    Final Year Project
  16. 16

    A review of slicing techniques in software engineering by Shah, Asadullah, Raza, Ali, Hassan, Basri, Shah, Abdul Salam

    Published 2015
    “…Process of model based slicing is utilized to extract the desired lump out of slice diagram. This specific survey focuses on slicing techniques in the fields of numerous programing paradigms like web applications, object oriented, and components based. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  17. 17

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…The project was planned using the Kanban development methodology, and was built using HTML, CSS, JavaScript, Django, NumPy and pandas. The completed web application is then hosted on Heroku. k-luster allows users to upload their own data set, or choose from one of three samples if they just want to try out the application. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18

    A modified π rough k-means algorithm for web page recommendation system by Zidane, Khaled Ali Othman

    Published 2018
    “…Web page recommendation system is an application of Web Usage Mining (WUM) approach, which specializes in predicting the user next browsing activity in real-time Web for personalized recommendations. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Computerized welding process selection and parameter determination by A. Aregia, Tarek Abdelhadi

    Published 2010
    “…On the other hand, a prototype of the proposed system was developed and deployed by using Oracle Application Express version 3.2 as a web page developer tool and Oracle Database 11g as data storage application. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Web application vulnerabilities detection model by Buja, Alya Geogiana, Abd. Jalil, Kamarularifin, Mohd Ali, Fakariah, Abdul Rahman, Teh Faradilla

    Published 2016
    “…The algorithm is used in order to match the defined criteria of each web vulnerability with the input information about web application. …”
    Get full text
    Get full text
    Research Reports