Search Results - (( leave application during algorithm ) OR ( parallel session methods algorithm ))
Search alternatives:
- application during »
- leave application »
- methods algorithm »
- during algorithm »
- session methods »
-
1
-
2
Predicting the optimum compositions of a transdermal nanoemulsion system containing an extract of Clinacanthus nutans leaves (L.) for skin antiaging by artificial neural network mo...
Published 2017“…In vivo ultrasound attributes of the skin study showed that the collagen content increased significantly with the application of the C. nutans nanoemulsion among all 21 volunteers during the 21 days of the treatment period. …”
Get full text
Get full text
Get full text
Article -
3
Advanced Encryption Standard Mobile Application to Improve College Entrance Security in UNIMAS
Published 2022“…This application also tracks the entrance and leave time of the visitors. …”
Get full text
Get full text
Get full text
Proceeding -
4
Advanced Encryption Standard Mobile Application to Improve College Entrance Security in UNIMAS
Published 2022“…This application also tracks the entrance and leave time of the visitors. …”
Get full text
Get full text
Get full text
Article -
5
A web usage mining approach based on LCS algorithm in online predicting recommendation systems
Published 2008“…The Internet is one of the fastest growing areas of intelligence gathering. During their navigation Web users leave many records of their activity. …”
Get full text
Get full text
Article -
6
Modeling forest fires risk using spatial decision tree
Published 2011Get full text
Get full text
Conference or Workshop Item -
7
Use of hybrid classification algorithm for land use and land cover analysis in data scarce environment
Published 2013“…A multi-date post-classification comparison algorithm was used to determine LULC changes in two intervals, 1986-1990, and 1990-2000. …”
Get full text
Get full text
Thesis -
8
Cornsense: leaf disease detection application / Iffah Fatinah Mohamad Nasir
Published 2025“…The purpose of this project is to develop a mobile application for corn leaf disease detection leveraging the YOLOv8 (You Only Look Once version 8) object detection algorithm. …”
Get full text
Get full text
Thesis -
9
NoInjection: Preventing Unsafe Queries on NoSQL-Document-model Databases
Published 2022“…This method utilizes the Asymmetric encryption algorithm, RSA in particular. Using this method, key pairs are generated and exchanged during the design. …”
Get full text
Get full text
Conference or Workshop Item -
10
NoInjection: Preventing Unsafe Queries on NoSQL-Document-model Databases
Published 2022“…This method utilizes the Asymmetric encryption algorithm, RSA in particular. Using this method, key pairs are generated and exchanged during the design. …”
Get full text
Get full text
Conference or Workshop Item -
11
-
12
-
13
Embedded vision system development using 32-bit Single Board Computer and GNU/Linux
Published 2011“…The image processing algorithm includes color space conversion and motion analysis technique. …”
Get full text
Thesis -
14
Semantic-Based, Scalable, Decentralized and Dynamic Resource Discovery for Internet-Based Distributed System
Published 2010“…We design a service search algorithm for the RA that starts the service look up from the class of request origin first, then to the other classes. …”
Get full text
Get full text
Thesis -
15
Semantic-Based, Scalable, Decentralized and Dynamic Resource Discovery for Internet-Based Distributed System
Published 2010“…We design a service search I algorithm for the RA that starts the service look up from the class of request origin first, then to the other classes. …”
Get full text
Get full text
Thesis
