Search Results - (( its applications ((a algorithm) OR (new algorithm)) ) OR ( web application using algorithmic ))*

Refine Results
  1. 1
  2. 2

    DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS by MEHMOOD SHAH, SYED NASIR

    Published 2012
    “…Thus, overall aim of this research is to introduce new grid scheduling algorithms for resource allocation as well as for job scheduling for enabling a highly efficient and effective utilization of the resources in executing various applications. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Content-based recommender system for an academic social network / Vala Ali Rohani by Vala Ali, Rohani

    Published 2014
    “…In this study, a new algorithm is proposed to represent an enhanced version of content-based recommender systems by utilizing social networking features. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Adopting Jaya Algorithm for Team Formation Problem by Kader, Md. Abdul, Kamal Z., Zamli

    Published 2020
    “…This paper presents a simple and mighty metaheuristic algorithm, Jaya, which is applied to solve the team formation (TF) problem and it is a very fundamental problem in many databases and expert collaboration networks or web applications. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A New Mobile Botnet Classification based on Permission and API Calls by Yusof, M, Saudi, MM, Ridzuan, F

    Published 2024
    “…Therefore, this paper presents a new mobile botnet classification based on permission and Application Programming Interface (API) calls in the smartphone. …”
    Proceedings Paper
  6. 6
  7. 7

    Automatic marking system for programming subject by Chan, Jin Yee

    Published 2023
    “…This project is a web application designed for lecturer that teaching programming subject to automatically mark programming algorithm exercise. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…In this modern era of enterprise computing, the enterprise application integration (EAI) is a well-known industry-recognized architectural principle that is built based on loosely coupled application architecture, where service-oriented architecture (SOA) is the architectural pattern for the implementation of EAI, whose computational elements are called as â��services.â�� Though SOA can be implemented in a wide range of technologies, the web services implementation of SOA becomes the current selective choice due to its simplicity that works on basic Internet protocols. …”
    Get full text
    Get full text
    Article
  9. 9

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…In this modern era of enterprise computing, the enterprise application integration (EAI) is a well-known industry-recognized architectural principle that is built based on loosely coupled application architecture, where service-oriented architecture (SOA) is the architectural pattern for the implementation of EAI, whose computational elements are called as â��services.â�� Though SOA can be implemented in a wide range of technologies, the web services implementation of SOA becomes the current selective choice due to its simplicity that works on basic Internet protocols. …”
    Get full text
    Get full text
    Article
  10. 10

    Image steganography using web application / Nor Arzami Othman ... [et al.] by Othman, Nor Arzami, Shariffudin, Muhammad Nur Harith, Osman, Mohd Nizam, Sedek, Khairul Anwar

    Published 2023
    “…The web application proved to be a versatile and practical tool with applications in various fields such as cryptography and digital forensics. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Efficient prime-based method for interactive mining of frequent patterns. by Mohammad Hossein, Nadimi Shahraki, Mustapha, Norwati, Sulaiman, Md. Nasir, Mamat, Ali

    Published 2011
    “…During the mining process, the mining algorithm reduces the number of candidate patterns and comparisons by using a new candidate set called candidate head set and several efficient pruning techniques. …”
    Get full text
    Get full text
    Article
  12. 12
  13. 13
  14. 14

    New species orchid recognition system using convolutional neural network / Annisa Atikah Mohd Fadzil and Itaza Afiani Mohtar by Mohd Fadzil, Annisa Atikah, Mohtar, Itaza Afiani

    Published 2021
    “…This project is to prove that the concept of new orchid species recognition can be done. The web application that created using HTML and Flask was able to recognize new species based on existing species. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16
  17. 17

    Face recognition and identification system (FaceRec) / Khew Jye Huei by Khew , Jye Huei

    Published 2004
    “…Face recognition is a technique to identify an individual by his/her physical characteristic and has been of interest to a growing number of researchers due to its applications on security. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Metocean Prediction using Hadoop, Spark & R by Sumayema, Kabir Ricky

    Published 2019
    “…The prediction from arima will be compared to an ML algorithm, Linear Regression, H2O AutoML and the actual data to see its correctness.…”
    Get full text
    Get full text
    Final Year Project
  20. 20

    Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun by Kok , Sun Sun

    Published 2000
    “…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
    Get full text
    Get full text
    Thesis