Search Results - (( developing web issues algorithm ) OR ( java visualization learning algorithm ))
Search alternatives:
- visualization learning »
- java visualization »
- learning algorithm »
- issues algorithm »
- developing web »
- web issues »
-
1
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…Build up a user interface by using Visual Studio Code (VSC) to run the coding of Cascading Style Sheet (CSS), Hyper Text Markup Language (HTML) and JavaScript (JS) as a webpage and connect to Azure Machine Learning Model and this will allow the user from using the model from a webpage when they have active internet with any devices.…”
Get full text
Get full text
Monograph -
2
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Web application vulnerabilities detection model
Published 2016“…This research aim to solve these issues by developing a detection model for detecting and recognizing the web vulnerabilities based on the defined and identified criteria. …”
Get full text
Get full text
Research Reports -
4
ScholarsAid: a personalized scholarship web application based on web scraping/ Muhammad Nur Haqeem Sulaiman and Norhasliza Ahmad
Published 2023“…The development of this web application has the potential to revolutionize the way students search and apply for scholarships. …”
Get full text
Get full text
Get full text
Article -
5
-
6
Paper Survey And Example Of Collaborative Filtering Implementation In Recommender System
Published 2017“…Text mining is considered the most related field to database management and web search queries. The relation to the database query, it needs suitable query algorithm web search and user profiling strategy. …”
Get full text
Get full text
Get full text
Article -
7
Rangka kerja keselamatan transaksi bagi pelanggan pelayan berasaskan perdagangan elektronik
Published 2003“…Research on website and server security currently have been developing Web Document Integrity Detector (WebDID) to overcome intrusion in website and web server. …”
Get full text
Get full text
Monograph -
8
Mobile application for real time baby sign language recognition using YOLOv8 / Siti Aishah Idris and Ahmad Firdaus Ahmad Fadzil
Published 2024“…The model will be designed and developed using a deep learning algorithm, which is YOLOv8, the latest version of YOLO. …”
Get full text
Get full text
Get full text
Article -
9
DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS
Published 2012“…The issue is not only to develop new algorithms, but also to evaluate them on an experimental computational grid, using synthetic and real workload traces, along with the other existing job scheduling algorithms. …”
Get full text
Get full text
Thesis -
10
Enhancement load balancing in failover web server by using HTTP-response status techniques with pfsense opensource / Muhammad Hafiz Ramli
Published 2020“…Furthermore, this research will evaluate the number of success rate for the user that successfully load the web page. Besides, notification of the HTTP-response status will be developed for the web server. …”
Get full text
Get full text
Thesis -
11
Using web questionnaire for web-based course evaluation: advantages and disadvantages
Published 2017“…In addition, before choosing a specific Web questionnaire or developing one, the timeline for data collection through Web survey, and the financial situation should be considered.…”
Get full text
Get full text
Conference or Workshop Item -
12
Student-Class (SC) optimization system / Haifaa Mahfuzah Hazalin
Published 2020“…To solve the issue the Student-Class Optimization System had been developed by using optimization technique, specifically, is a Greedy Algorithm. …”
Get full text
Get full text
Thesis -
13
An optimized attack tree model for security test case planning and generation
Published 2018“…This paper presents an attack tree modeling algorithm for deriving a minimal set of effective attack vectors required to test a web application for SQL injection vulnerabilities. …”
Get full text
Get full text
Article -
14
-
15
Web page design for electronic commerce / Lee Fong Wai
Published 2003“…This part covers the introduction of electronic commerce and online shopping, features of the online shopping software available in the market, data mining technology, programming languages, web development tools, database technology and also security issues. …”
Get full text
Get full text
Thesis -
16
Improving Extreme Programming Framework With Security Concerns For E-Commerce Applications
Published 2024thesis::doctoral thesis -
17
-
18
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…Therefore, it is essential to develop a new technique to authenticate access to database related to web applications and prevent SQL injection vulnerabilities. …”
Get full text
Get full text
Get full text
Article -
19
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…To address a specific cloud security challenges, an enhanced authentication method is developed during this research work. Motivated by a number of security experts in cloud computing, we proposed an innovative solution of authentication for cloud web-based applications. …”
Get full text
Get full text
Get full text
Thesis -
20
Stock price monitoring system
Published 2024“…This project is a development-based project with deep learning approach for academic purpose. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
