Search Results - (( java application a algorithm ) OR ( web evaluation using algorithm ))
Search alternatives:
- java application »
- evaluation using »
- using algorithm »
- web evaluation »
- application a »
- a algorithm »
-
1
Face recognition and identification system (FaceRec) / Khew Jye Huei
Published 2004“…It describes the implementation and functions of a working system that performs the recognition and identification of human faces using the implement algorithms. …”
Get full text
Get full text
Thesis -
2
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
3
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…The performance of KSFaci is evaluated using a four-factor evaluation metrics covering the user profile preciseness, recommendation service, staff directory and document repository. …”
Get full text
Get full text
Thesis -
4
-
5
RSA Encryption & Decryption using JAVA
Published 2006“…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
Get full text
Get full text
Final Year Project -
6
A new algorithm to measure relevance among Web pages
Published 2006“…This paper proposes a new algorithm to measure relevance among Web pages (RWP) using a hybrid method of hyperlink analysis and content analysis. …”
Get full text
Get full text
Get full text
Article -
7
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
8
Use of web page credibility information in increasing the accuracy of web-based question answering systems / Asad Ali Shah
Published 2017“…This research proposes a credibility assessment algorithm for evaluating Web pages and using their credibility score for ranking answers in Web-based QA systems. …”
Get full text
Get full text
Get full text
Thesis -
9
A Hybrid Approach For Web Search Result Clustering Based On Genetic Algorithm With K-means
Published 2024Get full text
journal::journal article -
10
A new ant based rule extraction algorithm for web classification
Published 2011“…Ant-Miner algorithm is also still lacking in efficiency, accuracy and rule simplicity because of the local minima problem.Therefore, the Ant-Miner algorithm needs to be improved by taking into consideration of the accuracy and rule simplicity criteria so that it could be used to classify Web documents data sets or any large data sets.The best attribute selection method for Web texts categorization is the combination of correlation-based evaluation with random search as the search method.However, this attribute selection method will not give the best performance in attributes reduction. …”
Get full text
Get full text
Get full text
Get full text
Monograph -
11
A hybrid Method Of Centroid-Based Clustering And Meta-Heuristic For Personalized Web Search
Published 2024thesis::doctoral thesis -
12
Using web questionnaire for web-based course evaluation: advantages and disadvantages
Published 2017“…The technology for Web questionnaire which have been used for survey research is still young and difficult. …”
Get full text
Get full text
Conference or Workshop Item -
13
Web application vulnerabilities detection model
Published 2016“…As the use of the web is increasing, the use of web application is also increasing. …”
Get full text
Get full text
Research Reports -
14
Adaptive method to improve web recommendation system for anonymous users
Published 2011“…An enhanced classification algorithm is used to assign the current anonymous user to the best web navigation profile. …”
Get full text
Get full text
Thesis -
15
An ensemble feature selection method to detect web spam
Published 2018“…Web spam is an illegal method to increase mendacious rank of internet pages by deceiving the algorithms of search engines, so it is essential to use an efficient method. …”
Get full text
Get full text
Get full text
Article -
16
An improved framework for content and link-based web spam detection: a combined approach
Published 2021“…The content-based web spam detection framework uses three proposed and two improved content-based algorithms for web spam detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Integrating of web 2.0 technologies for interactive courseware : data structure and algorithm as case study
Published 2013“…Besides that, the research also aims to develop a prototype for Interactive Courseware using Web 2.0 by integrating Web 2.0 technologies and services and lastly to evaluate the effectiveness and the usability of the project by comparing the pre-test and post-test result and surnmative evaluation respectively. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
18
Intelligent cooperative web caching policies for media objects based on decision tree supervised machine learning algorithm
Published 2014“…Moreover, cache pollution is a drawback of traditional web caching policies such as Least Frequently Used (LFU), Least Recently Used (LRU), and Greedy Dual Size (GDS) where web objects that are stored in the cache are not visited frequently. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
Published 2024“…XSS-DETREM has been evaluated empirically using a data set of JSP and Android web applications that have been used in previous studies. …”
Get full text
Get full text
Get full text
Thesis -
20
Stemming Algorithm in Searching Malay Text
Published 2004“…This project evaluates the retrieval effectiveness of stemming algorithm in searching and retrieving relevant Malay Web pages based on user natural query words. …”
Get full text
Get full text
Get full text
Thesis
