Search Results - (( web application path algorithm ) OR ( job applications mining algorithm ))*
Search alternatives:
- applications mining »
- application path »
- job applications »
- mining algorithm »
- web application »
- path algorithm »
-
1
-
2
A Data Mining Approach to Construct Graduates Employability Model in Malaysia
Published 2024Get full text
journal::journal article -
3
-
4
Development of web-based GIS for traffic management system with obstacle avoidance technique using open source software
Published 2014“…In order to calculate the shortest path between two nodes, Dijkstra algorithm was utilized. …”
Get full text
Get full text
Thesis -
5
-
6
-
7
A Dijkstra’s Mobile Web Application Engine for Generating Integrated Light Rail Transit Route
Published 2010“…In previous research we are implemented the mobile web application using rules based algorithm where the destination-oriented routes need to be dynamically generated by determining the nearest station according to the specific places. …”
Get full text
Get full text
Get full text
Article -
8
Data Mining On Machine Breakdowns And Effectiveness Of Scheduled Maintenance
Published 2019“…This provides a large corpus of information retrievable for data mining and knowledge discovery. The case study is focused on the investigation of machine breakdown and the effectiveness of scheduled maintenance with the application of data mining. …”
Get full text
Get full text
Monograph -
9
-
10
Optimization of LRT Route for Mobile Web Application Engine
Published 2009“…In this paper, we proposed the used of Dijkstra’s Algorithms to provide more effective and intelligent shortest path system to provide the solution for traveler to reach the desired destination. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
A Mobile Web Application Engine for Generating Destination-oriented LRT Route
Published 2009“…In this paper, we proposed the used of Dijkstra’s Algorithms to provide more effective and intelligent shortest path system to provide the solution for traveler to reach the desired destination.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
-
13
-
14
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
Published 2022“…The test was conducted using eleven PHP Web applications: ten applications available on the internet and that other researchers have used and one application that the researcher developed. …”
Get full text
Get full text
Thesis -
15
-
16
-
17
A New Model for Trojan Detection using Machine Learning Inspired by Al-Furqan Verse
Published 2024“…Moreover, the knowledge discovery techniques (KDD) and the data mining algorithm were used to optimize the accuracy result. …”
Article -
18
A review of slicing techniques in software engineering
Published 2015“…This specific survey focuses on slicing techniques in the fields of numerous programing paradigms like web applications, object oriented, and components based. …”
Get full text
Get full text
Get full text
Proceeding Paper
