Search Results - (( developing web page algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- implication based »
- java implication »
- developing web »
- page algorithm »
-
1
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
Get full text
Get full text
Thesis -
2
Development of a Web Access Control Technique Based User Access Behavior
Published 2004“…The necessary steps for the proposed technique are identified, and algorithms of these steps are developed and implemented using Active Server Page (ASP) and then tested on two web pages. …”
Get full text
Get full text
Thesis -
3
-
4
Use of web page credibility information in increasing the accuracy of web-based question answering systems / Asad Ali Shah
Published 2017“…This research proposes a credibility assessment algorithm for evaluating Web pages and using their credibility score for ranking answers in Web-based QA systems. …”
Get full text
Get full text
Get full text
Thesis -
5
Web based applications for energy management system incorporated network reconfiguration using genetic algorithm / Wan Adnan Wan
Published 2006“…This research was involved with the development of Web Based Applications for Energy Management System for providing Web application system, Web monitoring System and Genetic algorithm Based Network Reconfiguration Technique for loss minimization in the UiTM Distribution System. …”
Get full text
Get full text
Thesis -
6
Online Clothing Shopbots via Web Content Extraction / Nurul Syazwani Ramzi
Published 2017“…By using this algorithm, the web page is segmented into several big blocks. …”
Get full text
Get full text
Thesis -
7
A Web-Based Recommendation System To Predict User Movements Through Web Usage Mining
Published 2009“…In this phase, an undirected graph based on the Web pages as graph vertices and degree of connectivity between web pages as weight of the graph is created by proposing new formula for weight of the each edge in the graph. …”
Get full text
Get full text
Thesis -
8
A new classification model for online predicting users' future movements
Published 2008“…Nowadays many internet users prefer to navigate their interest web pages in special web site rather than navigating all web pages in the web site. …”
Get full text
Get full text
Conference or Workshop Item -
9
An improved framework for content-based spamdexing detection
Published 2020“…Many researchers from academia and industry are working on spamdexing to identify the spam web pages. However, so far not even a single universally efficient method is developed for identification of all spam web pages. …”
Get full text
Get full text
Get full text
Article -
10
Predicting next page access by Markov models and association rules on web log data
Published 2006“…A large amount of the research has been concentrated on trying to correctly predict the pages a user will request. This task requires the development of models that can predict a user’s next request to a web server. …”
Get full text
Get full text
Get full text
Article -
11
A framework of rough cultural algorithms in optimizing mobile web caching performance
Published 2007“…Consequently, The proposed caching scheme, Rough Cultural Algorithm (RCA) is developed to materialise the caching policies.…”
Get full text
Get full text
Article -
12
Enhancement load balancing in failover web server by using HTTP-response status techniques with pfsense opensource / Muhammad Hafiz Ramli
Published 2020“…Furthermore, this research will evaluate the number of success rate for the user that successfully load the web page. Besides, notification of the HTTP-response status will be developed for the web server. …”
Get full text
Get full text
Thesis -
13
Database encryption for a Web-based Claims System
Published 2008“…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
Get full text
Thesis -
14
Employing longest common subsequence method to retrieve translated Al-Quran documents / Muhamad Shamsudin
Published 2001“…The list is ordered, with the best match appearing at the top of the Web page.…”
Get full text
Get full text
Thesis -
15
Web page design for electronic commerce / Lee Fong Wai
Published 2003Get full text
Get full text
Thesis -
16
Document ranking using information quality criteria in weblog search engine
Published 2013“…A major problem is that a weblog includes nontraditional features of the Web pages such as Weblog post, links, tags, and comments. …”
Get full text
Get full text
Thesis -
17
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…The system consist of a central database and organized into web page application which can be accessed by system admin, certificate user, and employer. …”
Get full text
Get full text
Thesis -
18
Using Markov Model and Association Rules for Web Access Prediction
Published 2006“…A large amount of research has been done on trying to predict correctly the pages a user will request. This task requires the development of models that can predicts a user’s next request to a web server. …”
Get full text
Get full text
Conference or Workshop Item -
19
On the development of a web extension for text authentication on google chrome
Published 2019“…Upon clicking the button, the underlying algorithm in the extension software retrieves the texts from the current web-page being displayed. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
Published 2024“…Cross-site scripting (XSS) vulnerabilities are a major security threat for both desktop and mobile web applications. They occur due to lack of proper verification of the user inputs, which enables hackers to inject and execute malicious scripts in the web pages of an application. …”
Get full text
Get full text
Get full text
Thesis
