Search Results - (( web application model algorithm ) OR ( based applications using algorithms ))*

Refine Results
  1. 1
  2. 2
  3. 3

    Web application vulnerabilities detection model by Buja, Alya Geogiana, Abd. Jalil, Kamarularifin, Mohd Ali, Fakariah, Abdul Rahman, Teh Faradilla

    Published 2016
    “…As the use of the web is increasing, the use of web application is also increasing. …”
    Get full text
    Get full text
    Research Reports
  4. 4
  5. 5

    A web usage mining approach based on LCS algorithm in online predicting recommendation systems by Jalali, Mehrdad, Mustapha, Norwati, Sulaiman, Md. Nasir, Mamat, Ali

    Published 2008
    “…To provide online prediction efficiently, we advance an architecture for online predicting in Web Usage Mining system and propose a novel approach based on LCS algorithm for classifying user navigation patterns for predicting users' future requests. …”
    Get full text
    Get full text
    Article
  6. 6

    Cyberbullying detection: a machine learning approach by Yeong, Su Yen

    Published 2022
    “…Machine learning is a hot topic and it is widely implemented in software, web application and more. Those algorithms are used in the classification or regression model to predict an input. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7
  8. 8

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project is developed by using Rapid Application Development methodology as it is the model that is most suitable for developing this web tools. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11
  12. 12

    Grid portal technology for web based education of parallel computing courses, applications and researches by Alias, Norma, Islam, Md. Rajibul, Mydin, Suhaimi, Hamzah, Norhafiza, Safiza Abd. Ghaffar, Zarith, Satam, Noriza, Darwis, Roziha

    Published 2009
    “…This paper proposes the web service education technology for postgraduate parallel computing course, e-learning students, real-time solutions and for supervising projects related to the application of parallel computing, that focuses on the fundamental principles to parallel computer architecture, multimedia, communication cost, master-worker model, parallel algorithm, web services and performance evaluations. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Malaysian license plate recognition system using Convolutional Neural Network (CNN) on web application / Nur Farahana Mahmud by Mahmud, Nur Farahana

    Published 2022
    “…The objectives of this research are to develop a Malaysian license plate recognition system using a Convolutional Neural Network (CNN) on a web application and evaluate the performance of the system based on accuracy and loss values. …”
    Get full text
    Get full text
    Student Project
  14. 14
  15. 15
  16. 16

    ScholarsAid: a personalized scholarship web application based on web scraping/ Muhammad Nur Haqeem Sulaiman and Norhasliza Ahmad by Sulaiman, Muhammad Nur Haqeem, Ahmad, Norhasliza

    Published 2023
    “…The web application is developed using the Rapid Application Development (RAD) model and covers the entire process from data collection through to evaluation of the personalized scholarship recommendations. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    An integration of AHP-ACO technique for social interaction and travel planning by Peh, Perly Thai Ee

    Published 2016
    “…Object Oriented Software Engineering(OOSE) methodology has been used to build the mobile recommender system prototype and web application prototype. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Efficient prime-based method for interactive mining of frequent patterns. by Mohammad Hossein, Nadimi Shahraki, Mustapha, Norwati, Sulaiman, Md. Nasir, Mamat, Ali

    Published 2011
    “…This is because the appropriate value depends on the type of application and expectation of the user. Moreover, in some real-time applications such as web mining and e-business, finding new correlations between patterns by changing the minimum support threshold is needed. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment by Hasnira, Md. Lazim

    Published 2004
    “…The methodology and testing procedure which are used during this evaluation is based on a simulation model. …”
    Get full text
    Get full text
    Get full text
    Thesis