Search Results - (( developing affecting web algorithm ) OR ( java visualization learning algorithm ))

Refine Results
  1. 1

    Development Of Machine Learning User Interface For Pump Diagnostics by Lee, Zhao Yang

    Published 2022
    “…Build up a user interface by using Visual Studio Code (VSC) to run the coding of Cascading Style Sheet (CSS), Hyper Text Markup Language (HTML) and JavaScript (JS) as a webpage and connect to Azure Machine Learning Model and this will allow the user from using the model from a webpage when they have active internet with any devices.…”
    Get full text
    Get full text
    Monograph
  2. 2
  3. 3
  4. 4

    Mobile application for real time baby sign language recognition using YOLOv8 / Siti Aishah Idris and Ahmad Firdaus Ahmad Fadzil by Idris, Siti Aishah, Ahmad Fadzil, Ahmad Firdaus

    Published 2024
    “…The model will be designed and developed using a deep learning algorithm, which is YOLOv8, the latest version of YOLO. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Towards cross-site scripting vulnerability detection in mobile web applications by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty

    Published 2018
    “…Cross-site scripting vulnerabilities are among the top ten security vulnerabilities affecting web applications for the past decade and mobile version web applications more recently. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Early autism spectrum disorder detection using machine learning / Muhammad Shahmi Shahron Nizan by Shahron Nizan, Muhammad Shahmi

    Published 2023
    “…This project aims to develop a web-based application utilizing the Random Forest Classification Algorithm to aid concerned parents in detecting potential Autism Spectrum Disorder (ASD) symptoms in their children aged 1-6 years in Malaysia. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Analysis of genetic data in for implementation of compression algorithm in Alzheimer's disease database by Zainol Abidin, Husna, M. Yassin, Ihsan, Abdul Rahman, Farah Yasmin

    Published 2011
    “…This would cause database searches and transmissions over networks to become extremely slow, thus affecting the effectiveness of the database. Therefore, we propose an extension to [1], where we will incorporate a compression algorithm to the database. …”
    Get full text
    Get full text
    Research Reports
  9. 9

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…Therefore, it is essential to develop a new technique to authenticate access to database related to web applications and prevent SQL injection vulnerabilities. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11
  12. 12
  13. 13

    UiTM research supervisor recommendation system / Ahmad Adam Ahmad Muzzlini by Ahmad Muzzlini, Ahmad Adam

    Published 2022
    “…Python is the main language used for the project. Python’s flask web framework is used to develop the interface of the system and selenium for the web automation used for scraping the supervisor data. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Search engine optimization techniques for Malaysian university websites a comparative analysis on Google and Bing search engine by Shahzad, Asim, Mohd Nawi, Nazri, Sutoyo, Edi, Naeem, Muhammad, Ullah, Arif, Naqeeb, Sundas, Aamir, Muhammad

    Published 2018
    “…As Google modify its algorithm about 500 or more times per year, the web design and internet also evolves dynamically because of changes in SEO techniques and algorithms. …”
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Comparative analysis of web-based programs for single amino acid substitutions in proteins by Arunabh Choudhury, Taj Mohammad, Farah Anjum, Alaa Shafie, Indrakant K. Singh, Bekhzod Abdullaev, Pasupuleti Visweswara Rao, Mohd Adnan, Dharmendra Kumar Yadav, Md. Imtaiyaz Hassan

    Published 2022
    “…For a given mutation, each tool provides a score-based outcomes which indicates deleterious probability. In recent years, developments in existing programs and the introduction of new prediction algorithms have transformed the state-of-the-art protein mutation analysis. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Analysis of online CSR message authenticity on consumer purchase intention in social media on Internet platform via PSO-1DCNN algorithm by Li, Man, Liu, Fang, Abdullah, Zulhamri

    Published 2024
    “…Social media, made possible by developments in web and mobile technology, ushered in a new era of advertising on digital platforms. …”
    Get full text
    Get full text
    Article
  18. 18

    Intent-IQ: customer’s reviews intent recognition using random forest algorithm by Mazlan, Nur Farahnisrin, Ibrahim Teo, Noor Hasimah

    Published 2025
    “…Two machine learning model is chosen to build the classification models which are Random Forest (RF) algorithm and Multinomial Naïve Bayes (MNB) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim by Ibrahim, Mohd Faisal

    Published 2017
    “…The results showed that the decision algorithm improves the measurement by 28% and the degraded transcoded video does not affect students' comprehension.…”
    Get full text
    Get full text
    Thesis
  20. 20

    Resource management algorithms for wavelength division multiplexing optical metro slotted ring networks by Mohammed Abdulrazak, Fuaad Hasan

    Published 2012
    “…The proposed DBBR aims also to prevent misbehaving (i.e. malicious) nodes from affecting the network performance. The third proposed algorithm which is the Dynamic Scaling Bandwidth Reservation (DSBR) has been proposed to enhance the bandwidth utilization in HOPSMAN slotted WDM ring architecture. …”
    Get full text
    Get full text
    Thesis