Search Results - (( leave application based algorithm ) OR ( data application design algorithm ))

Refine Results
  1. 1
  2. 2

    A web usage mining approach based on LCS algorithm in online predicting recommendation systems by Jalali, Mehrdad, Mustapha, Norwati, Sulaiman, Md. Nasir, Mamat, Ali

    Published 2008
    “…Web Usage Mining (WUM) systems are specifically designed to carry out this task by analyzing the data representing usage data about a particular Web site. …”
    Get full text
    Get full text
    Article
  3. 3

    Classification model for hotspot occurrences using spatial decision tree algorithm by Sitanggang, Imas Sukaesih, Yaakob, Razali, Mustapha, Norwati, Nuruddin, Ahmad Ainuddin

    Published 2013
    “…This study describes the application of data mining technique namely decision tree on forest fires data. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Use of hybrid classification algorithm for land use and land cover analysis in data scarce environment by Al-Doski, Jwan M. Mohammed

    Published 2013
    “…On the contrary, there was a significant decrease in water bodies by 55% overall and other class designations. In conclusion, hybrid classification as a combination of k-means and support vector machine algorithms and post-classification comparison change detection technique can be used to monitor land cover changes in Halabja city, Iraq. …”
    Get full text
    Get full text
    Thesis
  5. 5

    NoInjection: Preventing Unsafe Queries on NoSQL-Document-model Databases by Imam, A.A., Basri, S., Gonzalez-Aparicio, M.T., Balogun, A.O., Kumar, G.

    Published 2022
    “…In this paper, a new method is introduced into the NoSQL design practice. This method utilizes the Asymmetric encryption algorithm, RSA in particular. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    NoInjection: Preventing Unsafe Queries on NoSQL-Document-model Databases by Imam, A.A., Basri, S., Gonzalez-Aparicio, M.T., Balogun, A.O., Kumar, G.

    Published 2022
    “…In this paper, a new method is introduced into the NoSQL design practice. This method utilizes the Asymmetric encryption algorithm, RSA in particular. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7
  8. 8
  9. 9

    Semantic-Based, Scalable, Decentralized and Dynamic Resource Discovery for Internet-Based Distributed System by Hassan, Mahamat. I, Azween, Abdullah

    Published 2010
    “…We design a service search algorithm for the RA that starts the service look up from the class of request origin first, then to the other classes. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Semantic-Based, Scalable, Decentralized and Dynamic Resource Discovery for Internet-Based Distributed System by HASSAN, MAHAMAT ISSA

    Published 2010
    “…We design a service search I algorithm for the RA that starts the service look up from the class of request origin first, then to the other classes. …”
    Get full text
    Get full text
    Thesis
  11. 11

    The comparative study of model-based and appearance based gait recognition for leave bag behind by Zainol, Norfazilah

    Published 2018
    “…Meanwhile, the accuracy and misclassification rate (MER) of Model-based approaches obtained is 97.00% and 3.00% respectively tested on SVM classifier then the accuracy and misclassification rate (MER) of Model-based approaches is 99.00% and 1.00% respectively tested on KNN algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Performance analysis of machine learning algorithms for classification of infection severity levels on rubber leaves by Mat Lazim, Siti Saripa Rabiah, Sulaiman, Zulkefly, Mat Nawi, Nazmi, Mohd Mustafah, Anas

    Published 2023
    “…Thus, this study was carried out to investigate the potential application of spectroscopic technology and machine learning algorithms to classify severity level of infected trees at early stage based on spectral data. …”
    Get full text
    Get full text
    Get full text
    Book Section
  14. 14

    The comparative study of model-based and appearance Based gait recognition for leave bag behind by Zainol, Norfazilah

    Published 2018
    “…Meanwhile, the accuracy and misclassification rate (MER) of Model-based approaches obtained is 97.00% and 3.00% respectively tested on SVM classifier then the accuracy and misclassification rate (MER) of Model-based approaches is 99.00% and 1.00% respectively tested on KNN algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Plant identification using combination of fuzzy c-means spatial pyramid matching, gist, multi-texton histogram and multiview dictionary learning by Safa, Soodabeh

    Published 2016
    “…Most of the existing plant identification methods are based on both the global shape features and the intact plant leaves. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Predicting the optimum compositions of a transdermal nanoemulsion system containing an extract of Clinacanthus nutans leaves (L.) for skin antiaging by artificial neural network mo... by Che Sulaiman, Intan Soraya, Basri, Mahiran, Masoumi, Hamid Reza Fard, Ashari, Siti Efliza, Basri, Hamidon, Ismail, Maznah

    Published 2017
    “…The model was applied to optimize the particle size of the transdermal nanoemulsion system containing an extract of C. nutans leaves for skin antiaging. Five universal learning algorithms—incremental back propagation, batch back propagation, quick propagation, genetic algorithm, and Levenberg-Marquardt—were used in the ANN to achieve the optimum topologies. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Design and analysis of management platform based on financial big data by Chen, Yuhua, Mustafa, Hasri, Zhang, Xuandong, Liu, Jing

    Published 2023
    “…In order to make financial big data generate business value and improve the information application level of financial management, aiming at the high error rate of current financial data classification system, this article adopts the fuzzy clustering algorithm to classify financial data automatically, and adopts the local outlier factor algorithm with neighborhood relation (NLOF) to detect abnormal data. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20