Search Results - (( web application ((out algorithm) OR (means algorithm)) ) OR ( some applications a algorithm ))*

Refine Results
  1. 1
  2. 2

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…The K-means algorithm has been around for over a century. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3

    Web based clustering tool using K-MEAN++ algorithm / Muhammad Nur Syazwanie Aznan by Aznan, Muhammad Nur Syazwanie Aznan

    Published 2019
    “…Which is why this project objective is to develop a web based clustering tool using K-MEAN++ algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A modified π rough k-means algorithm for web page recommendation system by Zidane, Khaled Ali Othman

    Published 2018
    “…Firstly, an extended K-Means clustering algorithm (called X-Means algorithm) is proposed to filter/remove the noise from user session data to eliminate outliers or irrelevant pages. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Web application vulnerabilities detection model by Buja, Alya Geogiana, Abd. Jalil, Kamarularifin, Mohd Ali, Fakariah, Abdul Rahman, Teh Faradilla

    Published 2016
    “…The algorithm is used in order to match the defined criteria of each web vulnerability with the input information about web application. …”
    Get full text
    Get full text
    Research Reports
  7. 7

    Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges by Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni

    Published 2014
    “…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9
  10. 10

    Content-based recommender system for an academic social network / Vala Ali Rohani by Vala Ali, Rohani

    Published 2014
    “…The algorithm exploits all interests and preferences in a hierarchy tree structure. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli by Dzulkifli, Muhammad Zulhilmie

    Published 2021
    “…To solve this problem, a mobile application has been proposed for customers to order their food and drink easily and the owner can manage the order without any restrictions. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14

    Registration and billing system by Chin Yong, Tan

    Published 2005
    “…To view the patient data and records, the bubble sort sorting algorithm has been applied.By applying this algorithm into the system prototype,the user of the system can get easily to look for the patient records in a list. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  15. 15

    Stock indicator scanner customization tool using deep reinforcement learning by Cheong, Desmond YongHong

    Published 2022
    “…This project will deliver a web application with dynamic stock prediction model based on deep reinforcement learning or more particularly, Deep Q-Network (DQN) algorithm which enable input customization. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16
  17. 17

    A Knowledge Management System for Assessing Lecturer Competence in Indonesian Higher Educational Institutions by Syaripudin, Undang

    Published 2025
    “…Next, crawling of all applications related to the Tridharma of higher education, namely education, research, and community service, is carried out using web services methods. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Studies on flat CORDIC implementation in field programmable gate arrays (FPGA) / Meera Subramaniam by Meera , Subramaniam

    Published 2004
    “…These operations map well onto hardware, and CORDIC is used in a multitude of signal processing applications. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20