Search Results - (( web applications a algorithm ) OR ( its application ((out algorithm) OR (means algorithm)) ))
Search alternatives:
- web applications »
- its application »
- means algorithm »
- applications a »
- out algorithm »
- a algorithm »
-
1
A Hybrid Approach For Web Search Result Clustering Based On Genetic Algorithm With K-means
Published 2024Get full text
journal::journal article -
2
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Web Usage Mining Using GSP Algorithm: A Study on Sultanah Bahiyah Library Online Databases
Published 2008“…Application of data mining to the World Wide Web referred as Web mining is at the cross road of research from several research communities which can be divided into three branches: Web Content Mining, Web Structure Mining and Web Usage Mining. …”
Get full text
Get full text
Get full text
Thesis -
4
Human health status IoT device using data optimization algorithm / Albin Lemuel Kushan ... [et al.]
Published 2021“…This project aims to produce a device that can be used to identify the current health status of a person using sensor and a data optimization algorithm. …”
Get full text
Get full text
Book Section -
5
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…The algorithm exploits all interests and preferences in a hierarchy tree structure. …”
Get full text
Get full text
Thesis -
6
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010Get full text
Get full text
Undergraduates Project Papers -
7
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010Get full text
Get full text
Undergraduates Project Papers -
8
Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari
Published 2017“…AES is being used widely in many applications since it is known for its faster encryption and decryption process and its strength. …”
Get full text
Get full text
Thesis -
9
Support Vector Machines (SVM) in Test Extraction
Published 2006“…Evaluation of the applications are carried out against another accompanying system-generated extract which is already in the market, as a means to observe the amount of sentences overlap with the tested applications, in this case, the Text Extractor and also Microsoft Word AutoSummarizer. …”
Get full text
Get full text
Final Year Project -
10
Support Vector Machines (SVM) in Test Extraction
Published 2006“…Evaluation of the applications are carried out against another accompanying system-generated extract which is already in the market, as a means to observe the amount of sentences overlap with the tested applications, in this case, the Text Extractor and also Microsoft Word AutoSummarizer. …”
Get full text
Get full text
Final Year Project -
11
Face recognition and identification system (FaceRec) / Khew Jye Huei
Published 2004“…Face recognition is a technique to identify an individual by his/her physical characteristic and has been of interest to a growing number of researchers due to its applications on security. …”
Get full text
Get full text
Thesis -
12
Defect green coffee bean detection using image recognition and supervised learning
Published 2022“…The model was integrated as web application with Flask where user can upload the image and the system will return result with precision and prediction. …”
Get full text
Get full text
Get full text
Academic Exercise -
13
-
14
Car license plate detection method for Malaysian plates-styles by using a web camera
Published 2010“…This work aims to build a Car License Plate Detection (CLPD) system at a lower cost of its hardware devices and with less complexity of algorithms' design, and then compare its performance with the local CAR Plate Extraction Technology (CARPET). …”
Get full text
Get full text
Get full text
Article -
15
Real time traceability module for halal logistic transportation using GPS and geofence technique
Published 2016“…Due to its significant function, whereby a conversion of manual procedure into a web based module is necessary, this module will be effective and brings benefits to the authorities, Halal logistic service providers and also users.…”
Get full text
Get full text
Thesis -
16
Intent-IQ: customer’s reviews intent recognition using random forest algorithm
Published 2025“…Intent-IQ is a web application system which allows users to input Shopee product link and it leads to the intent classification, where the reviews can be classified into its intent categories such as praise, complaint and suggestion. …”
Get full text
Get full text
Get full text
Article -
17
-
18
Optimization of multi-holes drilling toolpath using tiki-taka algorithm
Published 2024“…A computational experiment was conducted on 12 test problems across small, medium, and large problem categories using the TTA, then compared with Genetic Algorithm (GA), Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO), Crayfish Optimization Algorithm (COA), and Geometric Mean Optimizer (GMO). …”
Get full text
Get full text
Thesis -
19
Dynamic modelling of a flexible beam structure using feedforward neural networks for active vibration control
Published 2019“…The performance of modified SFS algorithm to train a nonlinear auto-regressive exogenous model (NARX) structure FNNs-based model of the system was then compared with its predecessor and with several well-known metaheuristic algorithms. …”
Get full text
Get full text
Get full text
Article -
20
Explore Ease
Published 2024“…The entire application experience, from the moment a user first visits the website to choosing services, logging in and out, and managing preferences and bookings, is made to be as simple as possible to use. …”
Get full text
Get full text
Final Year Project
