Search Results - (( data applications usage algorithm ) OR ( java application window algorithm ))

Refine Results
  1. 1

    Application-Programming Interface (API) for Song Recognition Systems by Murtadha Arif Sahbudin, Chakib Chaouch, Salvatore Serrano

    Published 2024
    “…In addition the implementation is done by algorithm using Java’s programming language, executed through an application developed in the Android operating system. …”
    Article
  2. 2

    Face recognition and identification system (FaceRec) / Khew Jye Huei by Khew , Jye Huei

    Published 2004
    “…Face recognition is a technique to identify an individual by his/her physical characteristic and has been of interest to a growing number of researchers due to its applications on security. Several different algorithms have been proposed for computer recognition of human faces. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Web Usage Mining for UUM Learning Care Using Association Rules by Azizul Azhar, Ramli

    Published 2004
    “…Web usage mining consists of three main phases, namely Data Preprocessing. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Web usage mining for UUM learning care using association rules by Ramli, Azizul Azhar

    Published 2004
    “…E-Leaming is one of the Web based application where it will facing with large amount of data. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A web usage mining approach based on LCS algorithm in online predicting recommendation systems by Jalali, Mehrdad, Mustapha, Norwati, Sulaiman, Md. Nasir, Mamat, Ali

    Published 2008
    “…Web Usage Mining (WUM) systems are specifically designed to carry out this task by analyzing the data representing usage data about a particular Web site. …”
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Web Usage Mining Using GSP Algorithm: A Study on Sultanah Bahiyah Library Online Databases by Hazzaimeh, Yousef Abd-AlMohdi

    Published 2008
    “…In this study web usage mining use sequential pattern technique with GSP algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Development of decentralized data fusion algorithm with optimized kalman filter. by Quadri, Sayed Abulhasan

    Published 2016
    “…The results in all the applications confirm that optimization has significantly reduced execution time and memory usage of selected data fusion algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A modified π rough k-means algorithm for web page recommendation system by Zidane, Khaled Ali Othman

    Published 2018
    “…Secondly, a modified πRKM algorithm is proposed to partition the user session data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13

    Data pre-processing on web server logs for generalized association rules mining algorithm by Abd Wahab, Mohd Helmy, Mohd, Mohd Norzali, Hanafi, Hafizul Fahri, Mohamad Mohsin, Mohamad Farhan

    Published 2008
    “…Since the pre-processing is tedious process, it depending on the algorithm and purposes of the applications.…”
    Get full text
    Get full text
    Article
  14. 14

    Fatigue data editing algorithm for automotive applications by Shahrum Abdullah, John R. Yates, Joseph A. Giacornin

    Published 2005
    “…The accuracy of the algorithm has been evaluated by application to two experimentally measured data sets containing tensile and compressive preloading conditions. …”
    Get full text
    Get full text
    Article
  15. 15

    Web usage mining: A review of recent works by Omar, Rosli, Md Tap, Abu Osman, Abdullah, Zainatul Shima

    Published 2015
    “…Web mining is the application of data mining on web data and web usage mining is an important component of web mining. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  16. 16
  17. 17

    Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil by Shahrul Kamil, Aiman Nurrasyid

    Published 2020
    “…The issue of providing end-toend data protection should has been given highest priority by IoT application developer because the data in both private and public networks can be modified and disrupted by attacker. …”
    Get full text
    Get full text
    Thesis
  18. 18

    E-Hadith DV: Hadith scriptures in Syafie Madhhab retrieval using data visualization / Nor Faezahtul Salme Norhisam by Norhisam, Nor Faezahtul Salme

    Published 2020
    “…Next, the TF-IDF algorithm is performed on the processed data to find the relevant hadith based on the user’s query. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20