Search Results - (( basic computer ((web algorithm) OR (_ algorithm)) ) OR ( java implication based algorithm ))
Search alternatives:
- implication based »
- java implication »
- basic computer »
- web algorithm »
-
1
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000Get full text
Get full text
Thesis -
2
Web usage mining for UUM learning care using association rules
Published 2004Get full text
Get full text
Thesis -
3
-
4
CSC562: Information Retrieval and Searching Algorithms / College of Computing, Informatics and Media
Published 2022Get full text
Get full text
Get full text
Teaching Resource -
5
Web based applications for energy management system incorporated network reconfiguration using genetic algorithm / Wan Adnan Wan
Published 2006“…This research was involved with the development of Web Based Applications for Energy Management System for providing Web application system, Web monitoring System and Genetic algorithm Based Network Reconfiguration Technique for loss minimization in the UiTM Distribution System. …”
Get full text
Get full text
Thesis -
6
-
7
Modifying iEclat algorithm for infrequent patterns mining
Published 2018Get full text
Get full text
Conference or Workshop Item -
8
-
9
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…This paper is written to present one of such algorithms to prevent SOA attacks on RESTful web services along the discussion on the obtained results of the conducted proof-of-concept on the real-time SOA environment. …”
Get full text
Get full text
Article -
10
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…This paper is written to present one of such algorithms to prevent SOA attacks on RESTful web services along the discussion on the obtained results of the conducted proof-of-concept on the real-time SOA environment. …”
Get full text
Get full text
Article -
11
Modifying iEclat algo ithm for infrequent patterns mining
Published 2018Get full text
Get full text
Conference or Workshop Item -
12
Unit Kesihatan UiTM (Perak) appointment scheduling system using Genetic Algorithm (GA) / Nur Amiera Abdul Rahman
Published 2014“…Alhamdulillah, my heartfelt thanks and gratitude to Allah SWT, that he was willing to give a chance with the good health and leisure time to complete this final year project proposal titled Unit Kesihatan UiTM (Perak) Appointment Scheduling System Using Genetic Algorithm (GA). The final year project has been properly drawn for Universiti Teknologi Mara (UiTM), basically for the students to complete the degree program leading to a Bachelor of Science (Hons) in Computer Science. …”
Get full text
Get full text
Thesis -
13
Studies on flat CORDIC implementation in field programmable gate arrays (FPGA) / Meera Subramaniam
Published 2004“…The CORDIC algorithm has been widely researched as an efficient hardware algorithm for the computation of trigonometric, hyperbolic and transcendental functions. …”
Get full text
Get full text
Thesis -
14
Web Camera Application For Motion Detection
Published 2003“…The system consists of only a web camera and a personal computer, which is incorporated with motion detection capability. …”
Get full text
Get full text
Thesis -
15
Visual tracking and servoing of human face for robotic head Amir-II
Published 2010“…The algorithm basically compares the locations of the face in the image plane that is detected from the static face image captured from real-time video stream. …”
Get full text
Get full text
Get full text
Proceeding Paper -
16
-
17
CAMERA TRACKING
Published 2006“…The capturing of the image is done through a web-camera connected to a computer that runs the program of image capture and tracking. …”
Get full text
Get full text
Final Year Project -
18
Website assurance monitoring application with MD5 Hashing and SHA-26 Algorithm / Abdullah Sani Abd Rahman and Samsiah Ahmad
Published 2022“…The Website Assurance Monitoring application has been developed based on MD5 hashing technique and SHA26 algorithm. By using Microsoft Visual Basic 6.0, the Graphical User Interfaces (GUIs) of the application to provide an easy or user-friendly monitoring application. …”
Get full text
Get full text
Get full text
Article -
19
AnkPlex: algorithmic structure for refinement of near-native ankyrin-protein docking
Published 2017“…Background: Computational analysis of protein-protein interaction provided the crucial information to increase the binding affinity without a change in basic conformation. …”
Get full text
Get full text
Article -
20
Improving Extreme Programming Framework With Security Concerns For E-Commerce Applications
Published 2024thesis::doctoral thesis
