Search Results - (( web application design algorithm ) OR ( its application tools algorithm ))*
Search alternatives:
- application design »
- application tools »
- design algorithm »
- web application »
- its application »
- tools algorithm »
-
1
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
Get full text
Get full text
Thesis -
2
Image steganography using web application / Nor Arzami Othman ... [et al.]
Published 2023“…The web application proved to be a versatile and practical tool with applications in various fields such as cryptography and digital forensics. …”
Get full text
Get full text
Get full text
Article -
3
Augmented reality monitoring system for cross-belt conveyor in advanced automation line / Sukarnur Che Abdullah ... [et al.]
Published 2025“…The algorithm's efficacy was validated through its application to a basic material handling process, specifically a barcode sorting conveyor. …”
Get full text
Get full text
Get full text
Article -
4
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…We have developed a cloud-based application that adapts the enhanced authentication method, and its security measurement were evaluated using IBM Application Security on Cloud tool. …”
Get full text
Get full text
Get full text
Thesis -
5
-
6
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017Get full text
Get full text
Conference or Workshop Item -
7
Developement of 3D virtual environment for Teratai College, UiTM Shah Alam using open source platform / Tengku Mohd Najib Tengku Ishak
Published 2006“…Once built, a user is able to move freely through the building interactively when the 3D objects save as *wrl format can be access by using plug-in player in web format. VRML (Virtual Reality Modelling Language) has been employed to enable virtual reality application to be unplemented on the web as the web maps into 3D environment. …”
Get full text
Get full text
Thesis -
8
Forecasting and tracking of project completion dateline using requirement traceability matrix in scrum
Published 2024“…The web application will incorporate various tools and techniques to aid in tracking project completion timelines. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Computerized welding process selection and parameter determination
Published 2010“…On the other hand, a prototype of the proposed system was developed and deployed by using Oracle Application Express version 3.2 as a web page developer tool and Oracle Database 11g as data storage application. …”
Get full text
Get full text
Thesis -
10
The conceptual framework of knowledge of large scale and incomplete graphs of skyline queries optimization using machine learning
Published 2025“…Ever since its introduction into the database community, skyline queries have been widely adopted in a range of contemporary database applications. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
Smart student timetable planner
Published 2025“…To achieve these objectives, the system adopts the Rapid Application Development (RAD) methodology, ensuring iterative design, prototyping, and user feedback integration throughout the process. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Steganography For Embedding Data In Digital Image
Published 2003“…This thesis discusses the issues regarding Steganography and its application to multimedia security and communication, addressing both theoretical and practical aspects, and tackling both design and attack problems. …”
Get full text
Get full text
Thesis -
13
Lower Form Grade System (LF-Grade Sys) / Norhanisha Yusof ... [et al.]
Published 2023“…Therefore, the objective of this study is to develop a Lower Form Grade System (LF-Grade Sys), which is a web-based application grading system that is designed to help teachers systematically record and store pupil grades. …”
Get full text
Get full text
Book Section -
14
A technique of dispatching algorithms for web-server cluster
Published 2011Get full text
Working Paper -
15
Web based applications for energy management system incorporated network reconfiguration using genetic algorithm / Wan Adnan Wan
Published 2006“…The Web Application System program is designed for the client to configure a system (e.g calculates a load flow). …”
Get full text
Get full text
Thesis -
16
Web application vulnerabilities detection model
Published 2016“…The algorithm is used in order to match the defined criteria of each web vulnerability with the input information about web application. …”
Get full text
Get full text
Research Reports -
17
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…The study on related work and comparison of algorithm also has been done in this phase. In Design phase, the use case diagram, whole system flowchart and subsystem flowchart has been constructed to assist the development of this web tool. …”
Get full text
Get full text
Thesis -
18
A web usage mining approach based on LCS algorithm in online predicting recommendation systems
Published 2008“…Advanced mining processes are needed for this knowledge to be extracted, understood and used. Web Usage Mining (WUM) systems are specifically designed to carry out this task by analyzing the data representing usage data about a particular Web site. …”
Get full text
Get full text
Article -
19
Development of a Web Access Control Technique Based User Access Behavior
Published 2004“…This thesis discusses about designs and develops techniques and algorithms for performing web access control. …”
Get full text
Get full text
Thesis -
20
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
Published 2024“…Cross-site scripting (XSS) vulnerabilities are a major security threat for both desktop and mobile web applications. They occur due to lack of proper verification of the user inputs, which enables hackers to inject and execute malicious scripts in the web pages of an application. …”
Get full text
Get full text
Get full text
Thesis
