Search Results - (( web application _ algorithm ) OR ( its applications ((means algorithm) OR (acs algorithm)) ))
Search alternatives:
- its applications »
- web application »
- means algorithm »
- acs algorithm »
-
1
A Hybrid Approach For Web Search Result Clustering Based On Genetic Algorithm With K-means
Published 2024Get full text
journal::journal article -
2
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Facial image retrieval on semantic features using adaptive mean genetic algorithm
Published 2019“…The performance matrix of the AMGA was compared to those of particle swarm optimization algorithm (PSO) and genetic algorithm (GA) and found to perform better; thus, proving its efficiency.…”
Get full text
Get full text
Get full text
Get full text
Article -
4
Parsing algorithms for grammars with regulated rewriting
Published 2011Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
5
-
6
-
7
Intent-IQ: customer’s reviews intent recognition using random forest algorithm
Published 2025“…Intent-IQ is a web application system which allows users to input Shopee product link and it leads to the intent classification, where the reviews can be classified into its intent categories such as praise, complaint and suggestion. …”
Get full text
Get full text
Get full text
Article -
8
-
9
Students Activity Recognition By Heart Rate Monitoring In Classroom Using K-means Classification
Published 2024Get full text
journal::journal article -
10
Anomaly detection of intrusion based on integration of rough sets and fuzzy c-means
Published 2005“…The objective of this paper is to describe a rough sets and fuzzy c-means algorithms and discuss its usage to detect intrusion in a computer network. …”
Get full text
Get full text
Get full text
Article -
11
Real-time vehicle counting using custom YOLOv8n and DeepSORT for resource-limited edge devices
Published 2024“…Recently, there has been a significant increase in the use of deep learning and low-computing edge devices for analysis of video-based systems, particularly in the field of intelligent transportation systems (ITS). One promising application of computer vision techniques in ITS is in the development of low- computing and accurate vehicle counting systems that can be used to eliminate dependence on external cloud computing resources. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
12
The conceptual framework of knowledge of large scale and incomplete graphs of skyline queries optimization using machine learning
Published 2025“…Ever since its introduction into the database community, skyline queries have been widely adopted in a range of contemporary database applications. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
Lower Form Grade System (LF-Grade Sys) / Norhanisha Yusof ... [et al.]
Published 2023“…Therefore, the objective of this study is to develop a Lower Form Grade System (LF-Grade Sys), which is a web-based application grading system that is designed to help teachers systematically record and store pupil grades. …”
Get full text
Get full text
Book Section -
14
Corrosion Inhibition Study Of Carboxymethyl Celluloseionic Liquid Via Electrochemical And Machine Learning Technique
Published 2024journal::journal article -
15
Strategies DACS3 Increasing its Performances
Published 2009Get full text
Get full text
Citation Index Journal -
16
Steganography For Embedding Data In Digital Image
Published 2003“…In the design part, we present new data hiding algorithms for binary images, grayscale and color images, covering such applications as annotation, fingerprinting, and ownership protection.…”
Get full text
Get full text
Thesis -
17
Dynamic feature selection model for adaptive cross site scripting attack detection using developed multi-agent deep Q learning model
Published 2023“…One of these most serious and frequent web application attacks is a Cross-site scripting attack (XSS). …”
Get full text
Get full text
Get full text
Article -
18
An e-voting application using cryptography technology
Published 2020“…The project is mainly a web application for the purpose of online voting. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Text Extraction Algorithm for Web Text Classification
Published 2010“…A text extraction prototype is built using Visual C# 2008 to validate the algorithm. It is a windows application mixed with web connection protocol. …”
Get full text
Get full text
Get full text
Thesis -
20
Embedding Malaysian House Red Ant Behavior into an Ant Colony System
Published 2008Get full text
Get full text
Citation Index Journal
