Search Results - (( its applications matching algorithm ) OR ( web application learning algorithm ))*

Refine Results
  1. 1

    Web Usage Mining for UUM Learning Care Using Association Rules by Azizul Azhar, Ramli

    Published 2004
    “…E-Learning is one of the Web based application where it will facing with large amount of data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Web usage mining for UUM learning care using association rules by Ramli, Azizul Azhar

    Published 2004
    “…Application of data milling techniques to the World Wide Web referred as Web mining where this term has been used in three distinct ways; Web Content Mining, Web Structure Mining and Web Usage Mining. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Evaluation of dynamic programming among the existing stereo matching algorithms by Teo, Chee Huat, Nurulfajar, Abd Manap

    Published 2015
    “…On this research is to perform an evaluation on the performance between the dynamic programming with other existing method as comparison. The algorithm used on the dynamic programming is the global optimization which provides better process on stereo images like its accuracy and its computational efficiency compared to other existing stereo matching algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun by Kok , Sun Sun

    Published 2000
    “…This system is achieved using the Genetic Algorithm which is capable of performing information retrieval and learning algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10

    Car dealership web application by Yap, Jheng Khin

    Published 2022
    “…In this project, a web application and a web service were proposed and implemented. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11

    Cyberbullying detection: a machine learning approach by Yeong, Su Yen

    Published 2022
    “…Machine learning is a hot topic and it is widely implemented in software, web application and more. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12
  13. 13

    Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin by Shamsudin, Farah Syadiyah

    Published 2017
    “…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. The results of False Matching Ratio (FMR) was 16.67% whilst the False Non-Matching Ratio (FNMR) was 33.33%. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16
  17. 17

    New Fast Block Matching Algorithm Using New Hybrid Search Pattern And Strategy To Improve Motion Estimation Process In Video Coding Technique by Hamid, Nurul 'Atiqah

    Published 2016
    “…Motion Estimation or ME is deemed as one of the effective and popular techniques in video compression. As one of its techniques, the Block Matching Algorithm or BMA is widely employed in majority of well-known video codes due to its simplicity and high compression efficiency. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    A Pixel Matching Process And Multiples Roi For Stereo Images In Stereo Vision Application by Hamzah, Rostam Affendi, Salleh, Azahari, A Aziz, Khairul Azha, Mohammed Napiah, Zul Atfyi Fauzan

    Published 2011
    “…This paper presents an analysis of stereo images for an application of stereo vision application. The matching process is to determine the difference of intensities of pixel between stereo images while the region of interest ROI works as a reference area to the stereo vision application. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…This paper is written to present one of such algorithms to prevent SOA attacks on RESTful web services along the discussion on the obtained results of the conducted proof-of-concept on the real-time SOA environment. …”
    Get full text
    Get full text
    Article
  20. 20

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…This paper is written to present one of such algorithms to prevent SOA attacks on RESTful web services along the discussion on the obtained results of the conducted proof-of-concept on the real-time SOA environment. …”
    Get full text
    Get full text
    Article