Search Results - (( web ((application bat) OR (application a)) algorithm ) OR ( some application _ algorithm ))*
Search alternatives:
- some application »
- application bat »
- application a »
-
1
Web application vulnerabilities detection model
Published 2016“…The algorithm is used in order to match the defined criteria of each web vulnerability with the input information about web application. …”
Get full text
Get full text
Research Reports -
2
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Web based clustering tool using K-MEAN++ algorithm / Muhammad Nur Syazwanie Aznan
Published 2019“…Which is why this project objective is to develop a web based clustering tool using K-MEAN++ algorithm. …”
Get full text
Get full text
Thesis -
4
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Although the web tool has some limitation which it can hold back the user experience on this web tool, but there are always room for improvement.…”
Get full text
Get full text
Thesis -
5
Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm
Published 2022“…This research will conduct comparison of hybrid Genetic Algorithm and Bat Algorithm (GA-BA) with Genetic Algorithm (GA) and Bat Algorithm (BA). …”
Get full text
Get full text
Get full text
Academic Exercise -
6
Intelligent Web caching using neurocomputing and particle swarm optimization algorithm
Published 2008Get full text
Get full text
Get full text
Conference or Workshop Item -
7
An improved framework for content and link-based web spam detection: a combined approach
Published 2021“…The content-based web spam detection framework uses three proposed and two improved content-based algorithms for web spam detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010Get full text
Get full text
Undergraduates Project Papers -
9
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010Get full text
Get full text
Undergraduates Project Papers -
10
School teacher-subject allocation management system
Published 2024“…This project will build STSAMS as a web-based application in React.js that is equipped with API server, database, and the allotment algorithm with the Scrum methodology. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…The algorithm exploits all interests and preferences in a hierarchy tree structure. …”
Get full text
Get full text
Thesis -
12
DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS
Published 2012“…Thus, overall aim of this research is to introduce new grid scheduling algorithms for resource allocation as well as for job scheduling for enabling a highly efficient and effective utilization of the resources in executing various applications. …”
Get full text
Get full text
Thesis -
13
-
14
Marine Predator Algorithm and Related Variants: A Systematic Review
Published 2025“…The study expounded the classical MPA’s workflow. It also unveiled a steady upward trend in the use of the algorithm. …”
Get full text
Get full text
Article -
15
Marine Predator Algorithm and Related Variants: A Systematic Review
Published 2025“…The study expounded the classical MPA’s workflow. It also unveiled a steady upward trend in the use of the algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
-
17
Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli
Published 2021“…The main goal of this study is to create an online food ordering app using the corresponding Boyer-Moore string matching algorithm. The application evaluation process is carried out by the developer's functionality test to ensure that there are no unnecessary issues in this app, especially in the main feature. …”
Get full text
Get full text
Thesis -
18
Efficient skyline processing algorithm over dynamic and incomplete database
Published 2018Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
Paper Survey And Example Of Collaborative Filtering Implementation In Recommender System
Published 2017“…Text mining is considered the most related field to database management and web search queries. The relation to the database query, it needs suitable query algorithm web search and user profiling strategy. …”
Get full text
Get full text
Get full text
Article -
20
A Dijkstra’s Mobile Web Application Engine for Generating Integrated Light Rail Transit Route
Published 2010“…In previous research we are implemented the mobile web application using rules based algorithm where the destination-oriented routes need to be dynamically generated by determining the nearest station according to the specific places. …”
Get full text
Get full text
Get full text
Article
