Search Results - (( web application ((among algorithm) OR (amh algorithm)) ) OR ( _ application status algorithm ))
Search alternatives:
- application status »
- status algorithm »
- web application »
- among algorithm »
- amh algorithm »
-
1
A Knowledge Management System for Assessing Lecturer Competence in Indonesian Higher Educational Institutions
Published 2025“…Competency development is carried out on this KMS by downloading lecturer competency materials as needed and conducting discussion forums among colleagues. Lecturer competency measurement is carried out by first checking employee status using the SVM algorithm with an accuracy value of 72.28%, then using a hybrid SVM and PSO algorithm with an accuracy value of 100%. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Forecasting and tracking of project completion dateline using requirement traceability matrix in scrum
Published 2024“…The web application will incorporate various tools and techniques to aid in tracking project completion timelines. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
A new algorithm to measure relevance among Web pages
Published 2006“…This paper proposes a new algorithm to measure relevance among Web pages (RWP) using a hybrid method of hyperlink analysis and content analysis. …”
Get full text
Get full text
Get full text
Article -
4
A new ant based rule extraction algorithm for web classification
Published 2011Get full text
Get full text
Get full text
Get full text
Monograph -
5
Web cluster load balancing via genetic-fuzzy based algorithm
Published 2007Get full text
Get full text
Get full text
Article -
6
Adaptive System State Based Load Balancing For Web Application Server Cluster Of Heterogeneous Performance Nodes
Published 2013“…This research is to propose a new efficient DNS-based load balancing algorithms that can solve a sudden increase of demand for service requests when they are applied to a local Domain Name Service (DNS) server for Web based applications and selected services. …”
Get full text
Get full text
Get full text
Thesis -
7
Towards cross-site scripting vulnerability detection in mobile web applications
Published 2018“…Cross-site scripting vulnerabilities are among the top ten security vulnerabilities affecting web applications for the past decade and mobile version web applications more recently. …”
Get full text
Get full text
Get full text
Article -
8
-
9
-
10
-
11
Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment
Published 2011“…Besides, this algorithm provides home users or application developers to implement their own event operators with bespoke syntax for their application purpose by defining cross-events corresponding to the event operators. …”
Get full text
Get full text
Thesis -
12
A study on classification learning algorithms to predict crime status.
Published 2013Get full text
Get full text
Article -
13
Mining Web usage using FRS
Published 2018“…Web Usage Mining (WUM) is the application of data mining methods in extracting potentially useful information from web usage data. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
Multi-population Genetic Algorithm for Rich Vehicle Routing Problems
Published 2020“…However, genetic algorithm is stochastic in nature and does not guarantee optimal solution in an application all the time, a problem referred to as premature convergence in literature. …”
Get full text
Get full text
Final Year Project -
15
Adopting Jaya Algorithm for Team Formation Problem
Published 2020“…This paper presents a simple and mighty metaheuristic algorithm, Jaya, which is applied to solve the team formation (TF) problem and it is a very fundamental problem in many databases and expert collaboration networks or web applications. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…The rapid growth of Web 2.0 applications, such as blogs and social networks creates rich online information and provides various new sources of knowledge. …”
Get full text
Get full text
Thesis -
17
-
18
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…Cross-Site Scripting (XSS) vulnerabilities are among the most common and most serious security vulnerabilities in Web applications. …”
Get full text
Get full text
Thesis -
19
-
20
Student resource exchange: a web-based system for sharing educational resources among students
Published 2025Get full text
Get full text
Final Year Project / Dissertation / Thesis
