Search Results - (( developing web efficient algorithm ) OR ( java implementation some algorithm ))
Search alternatives:
- java implementation »
- implementation some »
- developing web »
- some algorithm »
- web efficient »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
4
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
5
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
6
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
7
Web Based Supervisor Supervisee Project Matching System
Published 2010“…The algorithm was found to be good as it proved to have an accuracy of 81.39%, suggesting the efficiency and feasibility of the system.…”
Get full text
Get full text
Get full text
Thesis -
8
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
9
Implementation of RIO in UMJaNetSim / Chan Chin We
Published 2004“…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
Get full text
Get full text
Thesis -
10
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Database encryption for a Web-based Claims System
Published 2008“…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
Get full text
Thesis -
12
Web based personalized university timetable for UiTM students using genetic algorithm / Mohd Radhi Fauzan Jamli and Ahmad Firdaus Ahmad Fadzil
Published 2024“…Future work entails enhancing system robustness through comprehensive contingency planning, real-time data integration, and algorithmic optimization, with a focus on refining the genetic algorithm and exploring parallel processing techniques to further enhance efficiency and scalability.…”
Get full text
Get full text
Get full text
Article -
13
ScholarsAid: a personalized scholarship web application based on web scraping/ Muhammad Nur Haqeem Sulaiman and Norhasliza Ahmad
Published 2023“…The development of this web application has the potential to revolutionize the way students search and apply for scholarships. …”
Get full text
Get full text
Get full text
Article -
14
Using Markov Model and Association Rules for Web Access Prediction
Published 2006“…This algorithm has been used to cluster similar transition behaviors for efficient used to further improve the efficiency of prediction. …”
Get full text
Get full text
Conference or Workshop Item -
15
Enhancement load balancing in failover web server by using HTTP-response status techniques with pfsense opensource / Muhammad Hafiz Ramli
Published 2020“…There are few load balancing algorithms available that help load balance works efficiently across multiple servers. …”
Get full text
Get full text
Thesis -
16
A new classification model for online predicting users' future movements
Published 2008“…To provide online prediction efficiently, we advance architecture for online predicting in web usage mining system by proposing novel model based on Longest Common Subsequence algorithm for classifying user navigation patterns. …”
Get full text
Get full text
Conference or Workshop Item -
17
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
18
Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment
Published 2011“…By inheriting the capabilities of XML SOAP technology and Web Services, three new algorithms based on Event-Condition-Action (ECA) paradigm have been developed to facilitate efficient interoperation of the heterogeneous subsystems. …”
Get full text
Get full text
Thesis -
19
Predicting next page access by Markov models and association rules on web log data
Published 2006“…This algorithm has been used to cluster Web site with similar transition behaviors and compares the transition matrix to an optimal size for efficient used to further improve the efficiency of prediction. …”
Get full text
Get full text
Get full text
Article -
20
An optimized attack tree model for security test case planning and generation
Published 2018“…By leveraging on the optimized attack tree algorithm used in this research work, the threat model produces efficient test plans from which adequate test cases are derived to ensure a secured web application is designed, implemented and deployed. …”
Get full text
Get full text
Article
