Search Results - (( web application modified algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- application modified »
- java application »
- web application »
-
1
A modified π rough k-means algorithm for web page recommendation system
Published 2018“…In order to tackle above problem, a modified algorithm for Web page recommendation is proposed. …”
Get full text
Get full text
Get full text
Thesis -
2
Soap performance enhancement for high volume messaging / Ali Baba Dauda
Published 2018“…To achieve this aim, LZ77 compression algorithm is modified to encode more symbols. The algorithm is then integrated into two Web services with HTTP and JMS bindings. …”
Get full text
Get full text
Get full text
Thesis -
3
A Hybrid Approach For Web Search Result Clustering Based On Genetic Algorithm With K-means
Published 2024Get full text
journal::journal article -
4
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
Get full text
Get full text
Conference or Workshop Item -
5
Modifying iEclat algorithm for infrequent patterns mining
Published 2018Get full text
Get full text
Conference or Workshop Item -
6
Early autism spectrum disorder detection using machine learning / Muhammad Shahmi Shahron Nizan
Published 2023“…This project aims to develop a web-based application utilizing the Random Forest Classification Algorithm to aid concerned parents in detecting potential Autism Spectrum Disorder (ASD) symptoms in their children aged 1-6 years in Malaysia. …”
Get full text
Get full text
Thesis -
7
Modifying iEclat algo ithm for infrequent patterns mining
Published 2018Get full text
Get full text
Conference or Workshop Item -
8
-
9
New algorithm for attitude and orbit determination using magnetic field measurements
Published 2015Get full text
Get full text
Get full text
Proceeding Paper -
10
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
11
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
12
Objects tracking from natural features in mobile augmented reality
Published 2013“…The pose matrix from extracted features was calculated by Homography. The adapted algorithm was tested in a mobile AR-prototype application using iPhone. …”
Get full text
Get full text
Get full text
Article -
13
-
14
Handwriting recognition using webcam for data entry
Published 2014Get full text
Get full text
Final Year Project -
15
Energy Efficient High-Performance Computing Aware Proactive Dynamic Virtual Machine Consolidation Technique in Cloud Computing
Published 2022“…However, there are notable challenges that involve cross-application interference, energy issues, and maintaining service-level agreements (SLAs) in multiple metrics, e.g. response time (web application) vs execution time (HPC application). …”
Get full text
Get full text
Get full text
Thesis -
16
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Design and implementation of automatic number plate recognition on android platform
Published 2012“…Android platform has gained popularity in recent years in terms of market share and number of available applications. Android operating system is built on a modified Linux kernel with built-in services such as email, web browser, and map applications. …”
Get full text
Get full text
Get full text
Proceeding Paper -
18
