Search Results - (( web application method algorithm ) OR ( using solution using algorithm ))
Search alternatives:
- method algorithm »
- web application »
- using algorithm »
- using solution »
- solution using »
-
1
A modified π rough k-means algorithm for web page recommendation system
Published 2018“…To date, many works have been addressed in investigating the use of data mining techniques (e.g., Clustering) in Web page application. …”
Get full text
Get full text
Get full text
Thesis -
2
School teacher-subject allocation management system
Published 2024“…So, requirement gathering using multiple methods like interviews and system analysis will be performed the narrow down the constraints used in the algorithm, while also lowering the complexity of the Genetic Algorithm to reduce the time complexity. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
Multi-population Genetic Algorithm for Rich Vehicle Routing Problems
Published 2020“…However, genetic algorithm is stochastic in nature and does not guarantee optimal solution in an application all the time, a problem referred to as premature convergence in literature. …”
Get full text
Get full text
Final Year Project -
4
Adopting Jaya Algorithm for Team Formation Problem
Published 2020“…To evaluate the efficiency of the Jaya Algorithm (JA) against another metaheuristic algorithm, Sine-Cosine Algorithm (SCA), both algorithms are tested and assessed for the TF problem solution using an ACM dataset containing experts and their skills. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Analysis of Shrinkage on Thick Plate Part using Genetic Algorithm
Published 2016“…This paper presents a systematic methodology to analyse the shrinkage of the thick plate part during the injection moulding process. Genetic Algorithm (GA) method was proposed to optimise the process parameters that would result in optimal solutions of optimisation goals. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…The proposed authentication method, uses an enhanced method where the credentials are encrypted through an algorithm. …”
Get full text
Get full text
Get full text
Thesis -
7
Marine Predator Algorithm and Related Variants: A Systematic Review
Published 2025“…The Marine Predators Algorithm (MPA) is classified under swarm intelligence methods based on its type of inspiration. …”
Get full text
Get full text
Article -
8
Smart Routing For Solid Waste Collection
Published 2023“…The results of the evaluation will be used to design and develop a web-based application for route management, which will be made available to waste collection companies and garbage truck drivers. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
9
Marine Predator Algorithm and Related Variants: A Systematic Review
Published 2025“…—The Marine Predators Algorithm (MPA) is classified under swarm intelligence methods based on its type of inspiration. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
A spark-based parallel fuzzy C median algorithm for web log big data
Published 2022“…This paper proposes an efficient parallel Fuzzy C median solution based on Spark for large-scale web log data. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Sony applicant recruitment system using fuzzy logic / Nik Zurifa Nabilah Zulkifli
Published 2022“…Fuzzy Logic algorithms have adapted to fit a wide range of uses. …”
Get full text
Get full text
Thesis -
12
-
13
A systematic review of machine learning techniques and applications in soil improvement using green materials
Published 2023“…The current study aims to comprehensively evaluate recent breakthroughs in machine learning algorithms for soil improvement using a systematic procedure known as PRISMA and meta-analysis. …”
Get full text
Get full text
Article -
14
K-gen phishguard: an ensemble approach for phishing detection with k-means and genetic algorithm
Published 2025“…Predictions are aggregated using a soft voting mechanism. This research utilises the web page phishing detection dataset, which consists of 11,430 URLs with 87 features. …”
Get full text
Get full text
Get full text
Article -
15
-
16
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…Today, most web applications are vulnerable to SQL-injection attacks. …”
Get full text
Get full text
Get full text
Article -
17
Efficient dynamic DNA-based block cipher algorithm
Published 2023“…The significance of block cipher algorithms lies in their versatility and resilience. …”
Get full text
Get full text
Thesis -
18
A systematic review of machine learning techniques and applications in soil improvement using green materials
Published 2023“…The current study aims to comprehensively evaluate recent breakthroughs in machine learning algorithms for soil improvement using a systematic procedure known as PRISMA and meta-analysis. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
19
A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim
Published 2017“…Three recurring issues need to be addressed when constructing such solutions: 1) How to identify the device characteristic and the capabilities of a device, 2) How to find out about network resource availability, and 3) How to adapt application behavior. …”
Get full text
Get full text
Thesis -
20
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Some restricted areas such as the faculty, Dewan Canselori hall or even the hostel will become the place for the tourists to challenge to go. Recent industrial solutions to overcome the problem includes using manual registration, using 125kHz proximity card, using mobile application to scan QR code and others. …”
Get full text
Get full text
Get full text
Academic Exercise
