Search Results - (( ((web application) OR (_ application)) using algorithm ) OR ( its application out algorithm ))
Search alternatives:
- using algorithm »
- application out »
- out algorithm »
-
1
Web Usage Mining Using GSP Algorithm: A Study on Sultanah Bahiyah Library Online Databases
Published 2008“…In this study web usage mining use sequential pattern technique with GSP algorithm. …”
Get full text
Get full text
Get full text
Thesis -
2
Human health status IoT device using data optimization algorithm / Albin Lemuel Kushan ... [et al.]
Published 2021“…This project aims to produce a device that can be used to identify the current health status of a person using sensor and a data optimization algorithm. …”
Get full text
Get full text
Book Section -
3
Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm
Published 2022“…The result of the algorithm performance will be appeared in web application system. …”
Get full text
Get full text
Get full text
Academic Exercise -
4
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010Get full text
Get full text
Undergraduates Project Papers -
5
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010Get full text
Get full text
Undergraduates Project Papers -
6
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…The rapid growth of Web 2.0 applications, such as blogs and social networks creates rich online information and provides various new sources of knowledge. …”
Get full text
Get full text
Thesis -
7
Defect green coffee bean detection using image recognition and supervised learning
Published 2022“…The model was integrated as web application with Flask where user can upload the image and the system will return result with precision and prediction. …”
Get full text
Get full text
Get full text
Academic Exercise -
8
Face recognition and identification system (FaceRec) / Khew Jye Huei
Published 2004“…Face recognition is a technique to identify an individual by his/her physical characteristic and has been of interest to a growing number of researchers due to its applications on security. Several different algorithms have been proposed for computer recognition of human faces. …”
Get full text
Get full text
Thesis -
9
Car license plate detection method for Malaysian plates-styles by using a web camera
Published 2010“…Recently, license plate detection has been used in many applications especially in transportation systems. …”
Get full text
Get full text
Get full text
Article -
10
Optimal power flow using the Jaya algorithm
Published 2016“…Statistical analysis is also carried out to check the reliability of the Jaya algorithm. …”
Get full text
Get full text
Get full text
Article -
11
Voting algorithms for large scale fault-tolerant systems
Published 2011“…To do so, we have introduced a new sequential m-out-of-n algorithm with prediction ability which is known as enhanced m-out-of-n voter. …”
Get full text
Get full text
Thesis -
12
Parallel matrix-multiplication algorithm on network of workstations
Published 2004“…However, these types of algorithms often carried out on expensive supercomputers or multiprocessing systems. …”
Get full text
Get full text
Get full text
Article -
13
Real time traceability module for halal logistic transportation using GPS and geofence technique
Published 2016“…The existing geofence technique was upgraded by integrating spatial, temporal and speed rule in the ray casting algorithm used for this technique. As soon as the vehicle is on the move, the tracker will be stimulated, and the stopping location of the vehicle is being inspected, whether it is within the geofence area or otherwise. …”
Get full text
Get full text
Thesis -
14
Enhanced Continuous Face Recognition Algorithm for Bandwidth Constrained Network in Real Time Application
Published 2023Conference Paper -
15
An Improved of Channel Allocation for WLAN Using Vertex Merge Algorithm
Published 2012Get full text
Get full text
Conference or Workshop Item -
16
Stroke-to-stroke matching in on-line signature verification
Published 2010Get full text
Get full text
Thesis -
17
-
18
DC motor control using LQR algorithm
Published 2008“…An application in Matlab called Simulink is used as tools for algorithm implementation. …”
Get full text
Get full text
Undergraduates Project Papers -
19
Hybrid genetic manta ray foraging optimization and its application to interval type 2 fuzzy logic control of an inverted pendulum system
Published 2020“…However, this optimization algorithm can be improved in its strategy which increases its accuracy. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
