Search Results - (( _ application ((out algorithm) OR (acs algorithm)) ) OR ( web application need algorithm ))*
Search alternatives:
- application need »
- web application »
- need algorithm »
- out algorithm »
- acs algorithm »
-
1
Web Usage Mining Using GSP Algorithm: A Study on Sultanah Bahiyah Library Online Databases
Published 2008“…Application of data mining to the World Wide Web referred as Web mining is at the cross road of research from several research communities which can be divided into three branches: Web Content Mining, Web Structure Mining and Web Usage Mining. …”
Get full text
Get full text
Get full text
Thesis -
2
A web usage mining approach based on LCS algorithm in online predicting recommendation systems
Published 2008“…Web Usage Mining (WUM) systems are specifically designed to carry out this task by analyzing the data representing usage data about a particular Web site. …”
Get full text
Get full text
Article -
3
Soap performance enhancement for high volume messaging / Ali Baba Dauda
Published 2018“…To achieve this aim, LZ77 compression algorithm is modified to encode more symbols. The algorithm is then integrated into two Web services with HTTP and JMS bindings. …”
Get full text
Get full text
Get full text
Thesis -
4
Malaysian license plate recognition system using Convolutional Neural Network (CNN) on web application / Nur Farahana Mahmud
Published 2022“…The binary image of the extracted characters was fed to the CNN model for classification. In addition, a simple web application connected to Jupyter Notebook has been developed to perform the testing. …”
Get full text
Get full text
Student Project -
5
A Mobile Web Application Engine for Generating Destination-oriented LRT Route
Published 2009“…In previous research we already implement the mobile web application architecture where the destination-oriented routes need to be dynamically generated by determining the nearest station according to the specific places. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm
Published 2022“…Furthermore, CloudSim simulator will be used to evaluate the performance of this algorithm. The result of the algorithm performance will be appeared in web application system. …”
Get full text
Get full text
Get full text
Academic Exercise -
7
-
8
Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli
Published 2021“…The main goal of this study is to create an online food ordering app using the corresponding Boyer-Moore string matching algorithm. The application evaluation process is carried out by the developer's functionality test to ensure that there are no unnecessary issues in this app, especially in the main feature. …”
Get full text
Get full text
Thesis -
9
-
10
-
11
Investigation of various algorithms on multichannel audio compression
Published 2017Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
A Knowledge Management System for Assessing Lecturer Competence in Indonesian Higher Educational Institutions
Published 2025“…Next, crawling of all applications related to the Tridharma of higher education, namely education, research, and community service, is carried out using web services methods. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
-
14
Improvement DACS3 Searching Performance using Local Search
Published 2009Get full text
Get full text
Conference or Workshop Item -
15
-
16
Parallel matrix-multiplication algorithm on network of workstations
Published 2004“…However, these types of algorithms often carried out on expensive supercomputers or multiprocessing systems. …”
Get full text
Get full text
Get full text
Article -
17
-
18
-
19
Fast algorithm for VQ-based wavelet coding system
Published 2003Get full text
Get full text
Get full text
Proceeding Paper -
20
A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim
Published 2017“…Three recurring issues need to be addressed when constructing such solutions: 1) How to identify the device characteristic and the capabilities of a device, 2) How to find out about network resource availability, and 3) How to adapt application behavior. …”
Get full text
Get full text
Thesis
