Search Results - (( based application service algorithm ) OR ( _ application mining algorithm ))*

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    An artificial immune system model as talent performance predictor / Siti ‘Aisyah Sa’dan, Hamidah Jantan and Mohd Hanapi Abdul Latif by Sa’dan, Siti ‘Aisyah, Jantan, Hamidah, Abdul Latif, Mohd Hanapi

    Published 2016
    “…Immune based algorithm is part of bio-inspired algorithms elicits theories which can act as an inspiration for computer-based solutions. …”
    Get full text
    Get full text
    Research Reports
  6. 6
  7. 7

    Hybrid metaheuristics for QOS-aware service composition / Hadi Naghavipour by Hadi , Naghavipour

    Published 2022
    “…With the advent of Service-Oriented Architecture (SOA), services can be registered, invoked, and combined by their identical Quality of Services (QoS) attributes to create a new value-added application that fulfils user requirements. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10

    Sequential pattern mining on library transaction data by Sitanggang, Imas Sukaesih, Husin, Nor Azura, Agustina, Anita, Mahmoodian, Naghmeh

    Published 2010
    “…Application of data mining techniques in library data results interesting and useful patterns that can be used to improve services in university libraries. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Mining Web usage using FRS by Omar, Rosli, Abdullah, Zainatul Shima

    Published 2018
    “…Web Usage Mining (WUM) is the application of data mining methods in extracting potentially useful information from web usage data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12
  13. 13

    Profiling network traffic of Sultan Idris Shah building (BSIS) using data mining technique / Rusmawati Ishak by Ishak, Rusmawati

    Published 2018
    “…Hence, in order to make it reliable to provide good online services, we need to identify what kind of application, characteristic trend and behaviour of BSIS users in network infrastructure. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    A hybrid approach to improve recommendation system in E-tourism by Rahman M.M., Zaki Z.B.M., Alwi N.H.B.M., Monirul Islam M.

    Published 2024
    conference output::conference proceedings::conference paper
  17. 17

    Application of artificial intelligence (AI) in islamic investments by Haneffa Muchlis Gazali, Junisa Jumadi, Noor Rasyidah Ramlan, Nurmaisarah Abd Rahmat, Siti Nor Hazilawati Mohd Uzair, Amirah Norliyana Mohid

    Published 2020
    “…Thus, the discussion dwells on the cognitive application along with investment and compliance sectors of the financial services industry. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    An enhanced android botnet detection approach using feature refinement by Anwar, Shahid

    Published 2019
    “…That adopts machine learning techniques to classify botware and benign applications. This classification is performed on the base of botnet related unique patterns of additional requested features namely permissions, activities, broadcast receivers, services and API calls. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Modifying iEclat algorithm for infrequent patterns mining by Julaily Aida, J., Mustafa, M.

    Published 2018
    “…This paper proposes an enhancement algorithm based on iEclat algorithms for mining infrequent pattern.…”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20