Search Results - (( web application ((among algorithm) OR (acs algorithm)) ) OR ( web applications out algorithm ))*

Refine Results
  1. 1
  2. 2
  3. 3

    Content-based recommender system for an academic social network / Vala Ali Rohani by Vala Ali, Rohani

    Published 2014
    “…The rapid growth of Web 2.0 applications, such as blogs and social networks creates rich online information and provides various new sources of knowledge. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6

    A Knowledge Management System for Assessing Lecturer Competence in Indonesian Higher Educational Institutions by Syaripudin, Undang

    Published 2025
    “…Next, crawling of all applications related to the Tridharma of higher education, namely education, research, and community service, is carried out using web services methods. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar by Jaafar, Siti Aisyah

    Published 2021
    “…Conventional AR-IoT applications only specialize in the localized area for the on-site application and not applicable for a remote monitoring system. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10

    How can unmanned aerial vehicles be used for detecting weeds in agricultural fields? by Mohidem, Nur Adibah, Che’Ya, Nik Norasma, Juraimi, Abdul Shukor, Fazlil Ilahi, Wan Fazilah, Mohd Roslim, Muhammad Huzaifah, Sulaiman, Nursyazyla, Saberioon, Mohammadmehdi, Mohd Noor, Nisfariza Maris

    Published 2021
    “…This review aims to show the current and future trends of UAV applications in weed detection in the crop field. This study systematically searched the original articles published from 1 January 2016 to 18 June 2021 in the databases of Scopus, ScienceDirect, Commonwealth Agricultural Bureaux (CAB) Direct, and Web of Science (WoS) using Boolean string: “weed” AND “Unmanned Aerial Vehicle” OR “UAV” OR “drone”. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    A review of slicing techniques in software engineering by Shah, Asadullah, Raza, Ali, Hassan, Basri, Shah, Abdul Salam

    Published 2015
    “…Process of model based slicing is utilized to extract the desired lump out of slice diagram. This specific survey focuses on slicing techniques in the fields of numerous programing paradigms like web applications, object oriented, and components based. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12
  13. 13

    A new algorithm to measure relevance among Web pages by Sadi, M.S., Rahman, M.M. Hafizur, Horiguchi, Susumu

    Published 2006
    “…This paper proposes a new algorithm to measure relevance among Web pages (RWP) using a hybrid method of hyperlink analysis and content analysis. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…The project was planned using the Kanban development methodology, and was built using HTML, CSS, JavaScript, Django, NumPy and pandas. The completed web application is then hosted on Heroku. k-luster allows users to upload their own data set, or choose from one of three samples if they just want to try out the application. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15

    A modified π rough k-means algorithm for web page recommendation system by Zidane, Khaled Ali Othman

    Published 2018
    “…Web page recommendation system is an application of Web Usage Mining (WUM) approach, which specializes in predicting the user next browsing activity in real-time Web for personalized recommendations. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Web application vulnerabilities detection model by Buja, Alya Geogiana, Abd. Jalil, Kamarularifin, Mohd Ali, Fakariah, Abdul Rahman, Teh Faradilla

    Published 2016
    “…The algorithm is used in order to match the defined criteria of each web vulnerability with the input information about web application. …”
    Get full text
    Get full text
    Research Reports
  18. 18

    Web Usage Mining Using GSP Algorithm: A Study on Sultanah Bahiyah Library Online Databases by Hazzaimeh, Yousef Abd-AlMohdi

    Published 2008
    “…Application of data mining to the World Wide Web referred as Web mining is at the cross road of research from several research communities which can be divided into three branches: Web Content Mining, Web Structure Mining and Web Usage Mining. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    A web usage mining approach based on LCS algorithm in online predicting recommendation systems by Jalali, Mehrdad, Mustapha, Norwati, Sulaiman, Md. Nasir, Mamat, Ali

    Published 2008
    “…Advanced mining processes are needed for this knowledge to be extracted, understood and used. Web Usage Mining (WUM) systems are specifically designed to carry out this task by analyzing the data representing usage data about a particular Web site. …”
    Get full text
    Get full text
    Article
  20. 20