Search Results - (( web implications _ algorithm ) OR ( phone application ((bee algorithm) OR (new algorithm)) ))

Refine Results
  1. 1
  2. 2

    Application of a New Efficient Normal Parameter Reduction Algorithm of Soft Sets in Online Shopping by Ma, Xiuqin, Hongwu, Qin

    Published 2014
    “…However, up to the present, few documents have focused on real-life applications of this algorithm. Accordingly, we apply a New Efficient Normal Parameter Reduction algorithm into real-life datasets of online shopping, such as Blackberry Mobile Phone Dataset. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4
  5. 5

    Single channel speech enhancement using Wiener filter and compressive sensing by Sulong, Amart, Gunawan, Teddy Surya, Khalifa, Othman Omran, Kartiwi, Mira, Dao, Hassan

    Published 2017
    “…The speech enhancement algorithms are utilized to overcome multiple limitation factors in recent applications such as mobile phone and communication channel. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Analysis On QOS Parameters To Predict Http Response by A.Rahman, Khairulnizam

    Published 2017
    “…Therefore, the real live world web service label data uses to evaluate the focus parameters using classification machine learning algorithms to process the data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Web-based marketing communication to develop brand image and brand equity of higher educational institutions: a structural equation modelling approach by Momen, Md. Abdul, Sultana, Seyama, Haque, A. K. M. Ahasanul

    Published 2019
    “…Research limitations/implications – Future research can be done considering both online and conventional marketing communications for the same purpose. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Smart Home Security Using Facial Authentication by Rakshitha, M.V., Chitra, K.

    Published 2024
    “…The main objective is to improve privacy and security by using facial recognition based on the LBPH technique. The proposed application allows users to keep track of the happenings at their homes using mobile phones, Tablets, or PCs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    A Method for Mapping XML DTD to Relational Schemas In The Presence Of Functional Dependencies by Ahmad, Kamsuriah

    Published 2008
    “…To approach the mapping problem, three different components are explored: the mapping algorithm, functional dependency for XML, and implication process. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff by Mohd Yusoff, Nurulanis

    Published 2017
    “…Thus, it can be concluded that QEEA algorithm is the most energy efficient and the best candidate for provisioning the QoS for the real time (RT) and non-real time (NRT) applications.…”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Evaluation of authentication latency using predictive context transfer to support fast handover by Mohamad Hasnan, Siti Norhaizum, Muhammed Yusof, Zulkefli

    Published 2017
    “…The problem is due to the handover process to a new AP that takes time which may cause interruption to the applications that are in use. …”
    Get full text
    Get full text
    Book
  14. 14

    Wearable based-sensor fall detection system using machine learning algorithm by Ishak, Anis Nadia, Habaebi, Mohamed Hadi, Yusoff, Siti Hajar, Islam, Md. Rafiqul

    Published 2021
    “…Then, a Machine Learning Algorithm (MLA) is used to train and test the data before a classifier is used to classify the new incoming dataset. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  15. 15

    Sony applicant recruitment system using fuzzy logic / Nik Zurifa Nabilah Zulkifli by Zulkifli, Nik Zurifa Nabilah

    Published 2022
    “…Fuzzy Logic algorithms have adapted to fit a wide range of uses. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…In Chapter 2, we propose a new algorithm based on incremental Radial Basis Function Network (RBFN) to accelerate the learning in stream data. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19
  20. 20