Search Results - (( developing web method algorithm ) OR ( java implementation during algorithm ))
Search alternatives:
- implementation during »
- java implementation »
- method algorithm »
- during algorithm »
- developing web »
- web method »
-
1
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
2
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project is developed by using Rapid Application Development methodology as it is the model that is most suitable for developing this web tools. …”
Get full text
Get full text
Thesis -
3
Web based applications for energy management system incorporated network reconfiguration using genetic algorithm / Wan Adnan Wan
Published 2006“…This research was involved with the development of Web Based Applications for Energy Management System for providing Web application system, Web monitoring System and Genetic algorithm Based Network Reconfiguration Technique for loss minimization in the UiTM Distribution System. …”
Get full text
Get full text
Thesis -
4
Web based clustering tool using K-MEAN++ algorithm / Muhammad Nur Syazwanie Aznan
Published 2019“…Which is why this project objective is to develop a web based clustering tool using K-MEAN++ algorithm. …”
Get full text
Get full text
Thesis -
5
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
6
Web application vulnerabilities detection model
Published 2016“…The algorithm is used in order to match the defined criteria of each web vulnerability with the input information about web application. …”
Get full text
Get full text
Research Reports -
7
Database encryption for a Web-based Claims System
Published 2008“…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
Get full text
Thesis -
8
Rangka kerja keselamatan transaksi bagi pelanggan pelayan berasaskan perdagangan elektronik
Published 2003“…WebDID is an alternative method to protect web server by detecting unauthorised changes in web and sending an intrusion alarm directly to web server administrator. …”
Get full text
Get full text
Monograph -
9
Online Clothing Shopbots via Web Content Extraction / Nurul Syazwani Ramzi
Published 2017“…By using this algorithm, the web page is segmented into several big blocks. …”
Get full text
Get full text
Thesis -
10
WBEC: A web browsers evidence collection toolkit for web browsers usage in Windows 10
Published 2022“…By developing proofs-of-concept, this study presented a WBEC: Web Browsers EvidenceCollection Toolkit for improving the gathering of digital evidence kinds. …”
Get full text
Get full text
Article -
11
Algorithms for extracting adjacency matrix based on Formal Concept Analysis (FCA)
Published 2017“…However, the focus of the paper is on a method proposed to extract adjacency matrix from concepts obtained from the theory of Formal Concept Analysis (FCA) using two consecutive algorithms called the Relatedness Algorithm and Adjacency Matrix Algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
12
Improving collection of data type evidence and the integrity of evidence collected using SHA-256 hashing algorithm for web browsers
Published 2024“…This study introduces a method to enhance web browser evidence collection in digital forensic investigations. …”
Get full text
Get full text
Get full text
Article -
13
Use of web page credibility information in increasing the accuracy of web-based question answering systems / Asad Ali Shah
Published 2017“…This research attempts to improve accuracy in Web-based QA systems by developing a prototype Web-based QA system, named Optimal Methods QA (OMQA) system, which uses methods producing highest accuracy of answers, and improving the same by adding a credibility assessment module, called Credibility-based OMQA (CredOMQA) system. …”
Get full text
Get full text
Get full text
Thesis -
14
Music Recommender System Using Machine Learning Content-Based Filtering Technique
Published 2022“…The constant advancement of web development trends and technology has resulted in a big number of web systems that are frequently visited on a regular basis. …”
Get full text
Get full text
Undergraduates Project Papers -
15
A web-based library search engine using conflation method / Zulfahanan Abdul Gani
Published 2010“…Many methods are used in order to make a powerful search engine including by using Stemming Algorithm which are in Conflation Method. …”
Get full text
Get full text
Thesis -
16
-
17
Sports tournament scheduling using genetic algorithm / Hafeezur Syakir Abdul Motok@Mohd Ridzuan
Published 2020“…The system uses the Rapid Application Development (RAD) methodology in system development and will be operate on a web-based platform. …”
Get full text
Get full text
Thesis -
18
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
19
Using web questionnaire for web-based course evaluation: advantages and disadvantages
Published 2017“…In addition, before choosing a specific Web questionnaire or developing one, the timeline for data collection through Web survey, and the financial situation should be considered.…”
Get full text
Get full text
Conference or Workshop Item -
20
Using Markov Model and Association Rules for Web Access Prediction
Published 2006“…This task requires the development of models that can predicts a user’s next request to a web server. …”
Get full text
Get full text
Conference or Workshop Item
