Search Results - (( web applications out algorithm ) OR ( web application during algorithm ))*
Search alternatives:
- application during »
- web applications »
- applications out »
- during algorithm »
- web application »
- out algorithm »
-
1
A web usage mining approach based on LCS algorithm in online predicting recommendation systems
Published 2008“…Online prediction is one Web Usage Mining application. However, the accuracy of the prediction and classification in the current architecture of predicting users' future requests systems can not still satisfy users especially in huge Web sites. …”
Get full text
Get full text
Article -
2
Soap performance enhancement for high volume messaging / Ali Baba Dauda
Published 2018“…To achieve this aim, LZ77 compression algorithm is modified to encode more symbols. The algorithm is then integrated into two Web services with HTTP and JMS bindings. …”
Get full text
Get full text
Get full text
Thesis -
3
Re: Gen - web-based resume generator with content recommender for it job field / Nurul Syahmina Mohd Khairuddin … [et al.]
Published 2022“…Web-based is the platform chosen for this application to develop on as it is more faster and user-friendly application creation for desktop and mobile devices. …”
Get full text
Get full text
Get full text
Book Section -
4
An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar
Published 2021“…Conventional AR-IoT applications only specialize in the localized area for the on-site application and not applicable for a remote monitoring system. …”
Get full text
Get full text
Thesis -
5
Real time traceability module for halal logistic transportation using GPS and geofence technique
Published 2016“…This study presents a merged traceability module of GPS tracking system technology with geofence algorithm, entitled the Halal tracer. The significance of Halal tracer traceability module is that it mainly benefits in providing automatic detection on the spatial activity undergone during the shipment process of the Halal goods. …”
Get full text
Get full text
Thesis -
6
Ascertaining trust of information transmitted during a disaster
Published 2016“…With the presence of ICT applications and smartphone devices, the communications can be carried out easily. …”
Get full text
Get full text
Article -
7
Ascertaining trust of information transmitted during a disaster
Published 2016“…With the presence of ICT applications and smartphone devices, the communications can be carried out easily. …”
Get full text
Get full text
Article -
8
Ascertaining trust of information transmitted during a disaster
Published 2023“…With the presence of ICT applications and smartphone devices, the communications can be carried out easily. …”
Article -
9
How Can Unmanned Aerial Vehicles Be Used for Detecting Weeds in Agricultural Fields?
Published 2024Article -
10
How can unmanned aerial vehicles be used for detecting weeds in agricultural fields?
Published 2021“…Most of the studies (i.e., 27.42%) on weed detection were carried out during the seedling stage of the growing cycle for the crop. …”
Get full text
Get full text
Get full text
Article -
11
A review of slicing techniques in software engineering
Published 2015“…Process of model based slicing is utilized to extract the desired lump out of slice diagram. This specific survey focuses on slicing techniques in the fields of numerous programing paradigms like web applications, object oriented, and components based. …”
Get full text
Get full text
Get full text
Proceeding Paper -
12
A web-based implementation of k-means algorithms
Published 2022“…The project was planned using the Kanban development methodology, and was built using HTML, CSS, JavaScript, Django, NumPy and pandas. The completed web application is then hosted on Heroku. k-luster allows users to upload their own data set, or choose from one of three samples if they just want to try out the application. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
A modified π rough k-means algorithm for web page recommendation system
Published 2018“…Web page recommendation system is an application of Web Usage Mining (WUM) approach, which specializes in predicting the user next browsing activity in real-time Web for personalized recommendations. …”
Get full text
Get full text
Get full text
Thesis -
14
Efficient DNS based Load Balancing for Bursty Web Application Traffic
Published 2012“…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
Get full text
Get full text
Get full text
Article -
15
A framework of rough cultural algorithms in optimizing mobile web caching performance
Published 2007“…The common cause of poor performance is due to the direct access to the server (e.g. pitiable performance of server-side applications or during burst crowds) and network infrastructure (e.g. long geographical distances, network overloads, etc.). …”
Get full text
Get full text
Article -
16
Web cluster load balancing via genetic-fuzzy based algorithm
Published 2007Get full text
Get full text
Get full text
Article -
17
Web based applications for energy management system incorporated network reconfiguration using genetic algorithm / Wan Adnan Wan
Published 2006“…This research was involved with the development of Web Based Applications for Energy Management System for providing Web application system, Web monitoring System and Genetic algorithm Based Network Reconfiguration Technique for loss minimization in the UiTM Distribution System. …”
Get full text
Get full text
Thesis -
18
Target heart rate zone detector during exercise based on real-time facial expression using single shot detection algorithm / Muhammad Azziq Shamsudin, Raihah Aminuddin and Ummu Mar...
Published 2022“…As a solution, a web application named THR Zone detector is developed to access details about their specified THR according to the percentage intensity of the exercise. …”
Get full text
Get full text
Get full text
Book Section -
19
Web application vulnerabilities detection model
Published 2016“…The algorithm is used in order to match the defined criteria of each web vulnerability with the input information about web application. …”
Get full text
Get full text
Research Reports -
20
Web Usage Mining Using GSP Algorithm: A Study on Sultanah Bahiyah Library Online Databases
Published 2008“…Application of data mining to the World Wide Web referred as Web mining is at the cross road of research from several research communities which can be divided into three branches: Web Content Mining, Web Structure Mining and Web Usage Mining. …”
Get full text
Get full text
Get full text
Thesis
