Search Results - (( web application using algorithm ) OR ( its application ((out algorithm) OR (means algorithm)) ))
Search alternatives:
- web application »
- using algorithm »
- its application »
- means algorithm »
- out algorithm »
-
1
A Hybrid Approach For Web Search Result Clustering Based On Genetic Algorithm With K-means
Published 2024Get full text
journal::journal article -
2
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Web Usage Mining Using GSP Algorithm: A Study on Sultanah Bahiyah Library Online Databases
Published 2008“…In this study web usage mining use sequential pattern technique with GSP algorithm. …”
Get full text
Get full text
Get full text
Thesis -
4
Human health status IoT device using data optimization algorithm / Albin Lemuel Kushan ... [et al.]
Published 2021“…This project aims to produce a device that can be used to identify the current health status of a person using sensor and a data optimization algorithm. …”
Get full text
Get full text
Book Section -
5
Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm
Published 2022“…The result of the algorithm performance will be appeared in web application system. …”
Get full text
Get full text
Get full text
Academic Exercise -
6
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010Get full text
Get full text
Undergraduates Project Papers -
7
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010Get full text
Get full text
Undergraduates Project Papers -
8
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…The rapid growth of Web 2.0 applications, such as blogs and social networks creates rich online information and provides various new sources of knowledge. …”
Get full text
Get full text
Thesis -
9
Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari
Published 2017“…AES is being used widely in many applications since it is known for its faster encryption and decryption process and its strength. …”
Get full text
Get full text
Thesis -
10
Defect green coffee bean detection using image recognition and supervised learning
Published 2022“…The model was integrated as web application with Flask where user can upload the image and the system will return result with precision and prediction. …”
Get full text
Get full text
Get full text
Academic Exercise -
11
Face recognition and identification system (FaceRec) / Khew Jye Huei
Published 2004“…Face recognition is a technique to identify an individual by his/her physical characteristic and has been of interest to a growing number of researchers due to its applications on security. Several different algorithms have been proposed for computer recognition of human faces. …”
Get full text
Get full text
Thesis -
12
Support Vector Machines (SVM) in Test Extraction
Published 2006“…Evaluation of the applications are carried out against another accompanying system-generated extract which is already in the market, as a means to observe the amount of sentences overlap with the tested applications, in this case, the Text Extractor and also Microsoft Word AutoSummarizer. …”
Get full text
Get full text
Final Year Project -
13
Support Vector Machines (SVM) in Test Extraction
Published 2006“…Evaluation of the applications are carried out against another accompanying system-generated extract which is already in the market, as a means to observe the amount of sentences overlap with the tested applications, in this case, the Text Extractor and also Microsoft Word AutoSummarizer. …”
Get full text
Get full text
Final Year Project -
14
Car license plate detection method for Malaysian plates-styles by using a web camera
Published 2010“…Recently, license plate detection has been used in many applications especially in transportation systems. …”
Get full text
Get full text
Get full text
Article -
15
-
16
Intent-IQ: customer’s reviews intent recognition using random forest algorithm
Published 2025“…Intent-IQ is a web application system which allows users to input Shopee product link and it leads to the intent classification, where the reviews can be classified into its intent categories such as praise, complaint and suggestion. …”
Get full text
Get full text
Get full text
Article -
17
Real time traceability module for halal logistic transportation using GPS and geofence technique
Published 2016“…The existing geofence technique was upgraded by integrating spatial, temporal and speed rule in the ray casting algorithm used for this technique. As soon as the vehicle is on the move, the tracker will be stimulated, and the stopping location of the vehicle is being inspected, whether it is within the geofence area or otherwise. …”
Get full text
Get full text
Thesis -
18
-
19
Optimization of multi-holes drilling toolpath using tiki-taka algorithm
Published 2024“…A computational experiment was conducted on 12 test problems across small, medium, and large problem categories using the TTA, then compared with Genetic Algorithm (GA), Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO), Crayfish Optimization Algorithm (COA), and Geometric Mean Optimizer (GMO). …”
Get full text
Get full text
Thesis -
20
Dynamic modelling of a flexible beam structure using feedforward neural networks for active vibration control
Published 2019“…The performance of modified SFS algorithm to train a nonlinear auto-regressive exogenous model (NARX) structure FNNs-based model of the system was then compared with its predecessor and with several well-known metaheuristic algorithms. …”
Get full text
Get full text
Get full text
Article
