Search Results - (( web application out algorithm ) OR ( _ application during algorithm ))*
Search alternatives:
- application during »
- during algorithm »
- web application »
- application out »
- out algorithm »
-
1
A web usage mining approach based on LCS algorithm in online predicting recommendation systems
Published 2008“…Online prediction is one Web Usage Mining application. However, the accuracy of the prediction and classification in the current architecture of predicting users' future requests systems can not still satisfy users especially in huge Web sites. …”
Get full text
Get full text
Article -
2
Soap performance enhancement for high volume messaging / Ali Baba Dauda
Published 2018“…To achieve this aim, LZ77 compression algorithm is modified to encode more symbols. The algorithm is then integrated into two Web services with HTTP and JMS bindings. …”
Get full text
Get full text
Get full text
Thesis -
3
An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar
Published 2021“…Conventional AR-IoT applications only specialize in the localized area for the on-site application and not applicable for a remote monitoring system. …”
Get full text
Get full text
Thesis -
4
Real time traceability module for halal logistic transportation using GPS and geofence technique
Published 2016“…This study presents a merged traceability module of GPS tracking system technology with geofence algorithm, entitled the Halal tracer. The significance of Halal tracer traceability module is that it mainly benefits in providing automatic detection on the spatial activity undergone during the shipment process of the Halal goods. …”
Get full text
Get full text
Thesis -
5
Ascertaining trust of information transmitted during a disaster
Published 2016“…With the presence of ICT applications and smartphone devices, the communications can be carried out easily. …”
Get full text
Get full text
Article -
6
Ascertaining trust of information transmitted during a disaster
Published 2016“…With the presence of ICT applications and smartphone devices, the communications can be carried out easily. …”
Get full text
Get full text
Article -
7
Re: Gen - web-based resume generator with content recommender for it job field / Nurul Syahmina Mohd Khairuddin … [et al.]
Published 2022“…Content-based recommendation algorithm is implemented into the system as it can recommend the best skill content suitable for a job application. …”
Get full text
Get full text
Get full text
Book Section -
8
Ascertaining trust of information transmitted during a disaster
Published 2023“…With the presence of ICT applications and smartphone devices, the communications can be carried out easily. …”
Article -
9
How Can Unmanned Aerial Vehicles Be Used for Detecting Weeds in Agricultural Fields?
Published 2024Article -
10
How can unmanned aerial vehicles be used for detecting weeds in agricultural fields?
Published 2021“…Most of the studies (i.e., 27.42%) on weed detection were carried out during the seedling stage of the growing cycle for the crop. …”
Get full text
Get full text
Get full text
Article -
11
A web-based implementation of k-means algorithms
Published 2022“…The project was planned using the Kanban development methodology, and was built using HTML, CSS, JavaScript, Django, NumPy and pandas. The completed web application is then hosted on Heroku. k-luster allows users to upload their own data set, or choose from one of three samples if they just want to try out the application. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
A modified π rough k-means algorithm for web page recommendation system
Published 2018“…Web page recommendation system is an application of Web Usage Mining (WUM) approach, which specializes in predicting the user next browsing activity in real-time Web for personalized recommendations. …”
Get full text
Get full text
Get full text
Thesis -
13
A review of slicing techniques in software engineering
Published 2015“…Process of model based slicing is utilized to extract the desired lump out of slice diagram. This specific survey focuses on slicing techniques in the fields of numerous programing paradigms like web applications, object oriented, and components based. …”
Get full text
Get full text
Get full text
Proceeding Paper -
14
Web application vulnerabilities detection model
Published 2016“…The algorithm is used in order to match the defined criteria of each web vulnerability with the input information about web application. …”
Get full text
Get full text
Research Reports -
15
Web Usage Mining Using GSP Algorithm: A Study on Sultanah Bahiyah Library Online Databases
Published 2008“…Application of data mining to the World Wide Web referred as Web mining is at the cross road of research from several research communities which can be divided into three branches: Web Content Mining, Web Structure Mining and Web Usage Mining. …”
Get full text
Get full text
Get full text
Thesis -
16
Intelligent cooperative web caching policies for media objects based on decision tree supervised machine learning algorithm
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
17
-
18
-
19
-
20
