Search Results - (( developing web path algorithm ) OR ( java optimization mining algorithm ))
Search alternatives:
- java optimization »
- mining algorithm »
- developing web »
- path algorithm »
- web path »
-
1
Scalable approach for mining association rules from structured XML data
Published 2009Get full text
Get full text
Conference or Workshop Item -
2
Development of obstacle avoidance technique in web-based geographic information system for traffic management using open source software
Published 2014“…By using OpenLayers and PHP a web-based GIS platform was developed to ease the systems usability.…”
Get full text
Get full text
Get full text
Article -
3
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Feature subset selection and classifier ensemble learning are familiar techniques with high ability to optimize above problems. Recently, various techniques based on different algorithms have been developed. …”
Get full text
Get full text
Thesis -
4
-
5
Development of web-based GIS for traffic management system with obstacle avoidance technique using open source software
Published 2014“…Obstacle avoidance technique was implemented in this algorithm to avoid the congested areas. A web-based traffic management system was developed using open source software in this study. …”
Get full text
Get full text
Thesis -
6
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
7
-
8
UiTM Malaysia route planner / Mohamad Yunus Mohamed Nasir
Published 2008“…The Route Planner's core is Dijkstra's shortest-path-finding algorithm, with extensions for time dependent delays and paths constrained by travel mode. …”
Get full text
Get full text
Thesis -
9
-
10
-
11
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
Published 2022“…The test was conducted using eleven PHP Web applications: ten applications available on the internet and that other researchers have used and one application that the researcher developed. …”
Get full text
Get full text
Thesis
