Search Results - (( data application server algorithm ) OR ( data classification using algorithm ))

Refine Results
  1. 1
  2. 2

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was mainly developing using java programming. Apache Tom cat was used as a server in order to run the application smoothly. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Intuitive content management system via manipulation and duplication with if-else rules classification by Chan, Chung Hoong

    Published 2018
    “…An ICMS is a content management system that uses three main important techniques to build, such as Manipulation method, Data Mining Prediction, and Boyer-Moore Horspool algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Service based load balance mechanism using software-defined networks / Ahmed Abdelaziz Abdelltif Osman by Ahmed Abdelaziz, Abdelltif Osman

    Published 2017
    “…To address aforementioned problems, we proposed a service based load balance (SBLB) mechanism using Software-Defined Networks (SDN). The SDN controller is leveraged to provide online flow classification. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Magnetic resonance imaging sense reconstruction system using FPGA / Muhammad Faisal Siddiqui by Muhammad Faisal , Siddiqui

    Published 2016
    “…Sensitivity Encoding (SENSE) is a widely used technique to reconstruct the artefact free images from the Parallel MRI (pMRI) aliased data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Adaptive method to improve web recommendation system for anonymous users by Almurtadha, Yahya Mohammed

    Published 2011
    “…This research focuses on improving the prediction of the next visited web pages and introduces them to current anonymous user. An enhanced classification algorithm is used to assign the current anonymous user to the best web navigation profile. …”
    Get full text
    Get full text
    Thesis
  7. 7

    NETASA: neural network based prediction of solvent accessibility by Ahmad, Shandar, Gromiha, M. Michael

    Published 2002
    “…In the present work, we have implemented a server, NETASA for predicting solvent accessibility of amino acids using our newly optimized neural network algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Q-Learning-based detection of IPv6 intrusions: a behavioral and performance study by Daru, April Firman, Hirzan, Alauddin Maulana, Mahmod Attar Bashi, Zainab Senan, Fanani, Fajriannoor

    Published 2025
    “…This time-consuming retraining process may increase vulnerability during adaptation periods, as the networks will be exposed to zero-day attacks until updated training data is available. To address this limitation, the present study proposes a self-learning model using reinforcement learning techniques, specifically the Q-Learning algorithm, to classify network intrusions based on learned behavioural patterns autonomously. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  9. 9

    Secure Access To Authorized Resources Based On Fingerprint Authentication by Elmadani, Ahmed Baba

    Published 2003
    “…The A VL tree is used to increase the compression ratio as its compression algorithm works efficiently for all types of data. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12
  13. 13

    Load balancing and server consolidation in cloud computing environments: a meta-study by Fadhil, Mohammed Alaa, Othman, Mohamed

    Published 2019
    “…Load balancing with server consolidation enriches the exploitation of resource utilization and can enhance Quality of Service (QoS) metrics, since data-centers and their applications are increasing exponentially. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Data pre-processing on web server logs for generalized association rules mining algorithm by Abd Wahab, Mohd Helmy, Mohd, Mohd Norzali, Hanafi, Hafizul Fahri, Mohamad Mohsin, Mohamad Farhan

    Published 2008
    “…Since the pre-processing is tedious process, it depending on the algorithm and purposes of the applications.…”
    Get full text
    Get full text
    Article
  15. 15

    Improving Classification of Remotely Sensed Data Using Best Band Selection Index and Cluster Labelling Algorithms by Teoh, Chin Chuang

    Published 2005
    “…In cluster generating process, the developed BBSI algorithm was used to select the best band combination for generating cluster by using Iterative self- Organizing Data Analysis (ISODATA) technique. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Case Slicing Technique for Feature Selection by A. Shiba, Omar A.

    Published 2004
    “…Since the 1960s, many algorithms for data classification have been proposed. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Locust- inspired meta-heuristic algorithm for optimising cloud computing performance by Fadhil, Mohammed Alaa

    Published 2023
    “…The cloud paradigm has arisen due to a rapid growth in applications and data sizes. Even though cloud computing servers and resources may seem unlimited, this is not true, as increased server usage leads to increased energy consumption and carbon emissions. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Dengue classification system using clonal selection algorithm / Karimah Mohd by Mohd, Karimah

    Published 2012
    “…Some of the dengue data are used to test the dengue classification system to produce the classification accuracy. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Enhancing Classification Algorithms with Metaheuristic Technique by Cokro, Nurwinto, Tri Basuki, Kurniawan, Misinem, ., Tata, Sutabri, Yesi Novaria, Kunang

    Published 2024
    “…Implementing this process uses classification algorithms such asNaïve Bayes, Support Vector Machine,and Random Forest. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Classification of breast cancer disease using bagging fuzzy-id3 algorithm based on fuzzydbd by Nur Farahaina, Idris

    Published 2022
    “…Classification is a data mining technique used to classify varied data types according to a specific criterion. …”
    Get full text
    Get full text
    Thesis