Search Results - (( leave application design algorithm ) OR ( leave application towards algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9

    Classification model for hotspot occurrences using spatial decision tree algorithm by Sitanggang, Imas Sukaesih, Yaakob, Razali, Mustapha, Norwati, Nuruddin, Ahmad Ainuddin

    Published 2013
    “…The ID3 algorithm which is originally designed for a non-spatial dataset has been improved to construct a spatial decision tree from a spatial dataset containing discrete features (points, lines and polygons). …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    A web usage mining approach based on LCS algorithm in online predicting recommendation systems by Jalali, Mehrdad, Mustapha, Norwati, Sulaiman, Md. Nasir, Mamat, Ali

    Published 2008
    “…During their navigation Web users leave many records of their activity. This huge amount of data can be a useful source of knowledge. …”
    Get full text
    Get full text
    Article
  11. 11

    LOCALIZED MOVEMENT CONTROL CONNECTIVITY RESTORATION ALGORITHMS FOR WIRELESS SENSOR AND ACTOR NETWORKS by MUHAMMAD IMRAN, MUHAMMAD IMRAN

    Published 2011
    “…In the third approach, we design a distributed algorithm that recovers from a special case of multiple simultaneous failures. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Development of interactive application for classification of Artocarpus Species by Abdul Ghapar, Nadia

    Published 2020
    “…The aim of this research is to identify the classification of Artocarpus species by using interactive application and the effectiveness of the interactive application for classification of Artocarpus species. …”
    Get full text
    Undergraduate Final Project Report
  14. 14

    Cornsense: leaf disease detection application / Iffah Fatinah Mohamad Nasir by Mohamad Nasir, Iffah Fatinah

    Published 2025
    “…The purpose of this project is to develop a mobile application for corn leaf disease detection leveraging the YOLOv8 (You Only Look Once version 8) object detection algorithm. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Smart Irrigation System Using Raspberry Pi by Sahrom, Ahmad Syamil, Aminuddin, Raihah

    Published 2020
    “…Suitable for people who are working but currently leaving plants at home with nobody to take of it. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    NoInjection: Preventing Unsafe Queries on NoSQL-Document-model Databases by Imam, A.A., Basri, S., Gonzalez-Aparicio, M.T., Balogun, A.O., Kumar, G.

    Published 2022
    “…In this paper, a new method is introduced into the NoSQL design practice. This method utilizes the Asymmetric encryption algorithm, RSA in particular. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    NoInjection: Preventing Unsafe Queries on NoSQL-Document-model Databases by Imam, A.A., Basri, S., Gonzalez-Aparicio, M.T., Balogun, A.O., Kumar, G.

    Published 2022
    “…In this paper, a new method is introduced into the NoSQL design practice. This method utilizes the Asymmetric encryption algorithm, RSA in particular. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    A Decentralized Multi-Factor User Authentication Scheme For The Internet Of Things System by Chiadighikaobi, Ikenna Rene

    Published 2024
    “…This study shows that an authentication scheme's design and implementation approach determine the security and computation cost performance. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Use of hybrid classification algorithm for land use and land cover analysis in data scarce environment by Al-Doski, Jwan M. Mohammed

    Published 2013
    “…On the contrary, there was a significant decrease in water bodies by 55% overall and other class designations. In conclusion, hybrid classification as a combination of k-means and support vector machine algorithms and post-classification comparison change detection technique can be used to monitor land cover changes in Halabja city, Iraq. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider by Omer Fadlelmola Elkhider, Samih

    Published 2011
    “…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
    Get full text
    Get full text
    Thesis