Search Results - (( developing effective usage algorithm ) OR ( java identification using algorithm ))
Search alternatives:
- identification using »
- java identification »
- usage algorithm »
- using algorithm »
-
1
Identification of microcalcification in mammographic images / Noor Azliza Abdul Shauti
Published 2008“…By using this identification, it can simulate in flexible images post processing and analysis in easy image management using Java aplication. …”
Get full text
Get full text
Thesis -
2
Face recognition and identification system (FaceRec) / Khew Jye Huei
Published 2004“…It describes the implementation and functions of a working system that performs the recognition and identification of human faces using the implement algorithms. …”
Get full text
Get full text
Thesis -
3
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
4
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. …”
Get full text
Get full text
Get full text
Thesis -
5
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol using 64 bits index is proved having the lowest non-unequivocally identification probability. …”
Get full text
Get full text
Thesis -
6
An Effective Fast Searching Algorithm for Internet Crawling Usage
Published 2016“…Therefore, an effective search algorithm is very crucial as most of the users are depending on it. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Development of a Raspberry Pi Drowsiness Detection System based on Histogram of Oriented Gradient (HOG) Algorithm and Eye Aspect Ratio (EAR) Formula
Published 2020“…As overall, this paper proposes the development of a cost and power saving and effective drowsiness detection system by implementing EAR formula and HOG algorithm, which would be easily fixed and utilized in all type of four-wheeled vehicles.…”
Get full text
Get full text
Final Year Project -
8
Investigation and modelling of building energy management system for sustainable energy usage
Published 2024text::Final Year Project -
9
A recommender system approach for classifying user navigation patterns using longest common subsequence algorithm.
Published 2009“…In this paper, to provide online predicting effectively, we develop a model for online predicting through web usage mining system and propose a novel approach for classifying user navigation patterns to predict users’ future intentions. …”
Get full text
Get full text
Article -
10
Fair Traffic Scheduling and Shaping Algorithms for Diffserv Networks
Published 2006“…This thesis investigates the effect of different scheduling mechanisms and usage of a different marker algorithms then develop and implement a fair scheduling mechanism and integrate it with a shaper with the usage of a very fair efficient marker at the edge of the DiffServ networks with the usage of simulation and analytical techniques. …”
Get full text
Get full text
Thesis -
11
A Web-Based Recommendation System To Predict User Movements Through Web Usage Mining
Published 2009“…To provide online prediction effectively, this study has developed a Web based recommendation system to Predict User Movements, named as WebPUM, for online prediction through web usage mining system and proposed a novel approach for classifying user navigation patterns to predict users‘ future intentions. …”
Get full text
Get full text
Thesis -
12
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…Regression test case prioritisation (TCP) is used to revalidate modified software, ensuring its quality before release on the digital market. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
WebPUM : a web-based recommendation system to predict user future movements.
Published 2010“…To effectively provide online prediction, we have developed a recommendation system called WebPUM, an action using Web usage mining system and propose a novel approach online prediction for classifying user navigation patterns to predict users’ future intentions. …”
Get full text
Get full text
Get full text
Article -
14
A genetic similarity algorithm for searching the Gene Ontology terms and annotating anonymous protein sequences
Published 2008“…The computational results and comparison with other related tools are presented to show the effectiveness of the proposed algorithm and tools.…”
Get full text
Get full text
Get full text
Article -
15
Predicting usage for a marketable e-learning portal
Published 2014“…To date, existing e-learning portals focuses on providing various learning materials via online.Such an approach may provide huge benefit to the learners; nevertheless, less value can be obtained by the developers or owners.The knowledge transfer programme provides an insight on how existing e-learning portal can be upgraded.The academia has introduced the industry to a computational modelling that is built upon the behaviour of nature community (i.e bees)The utilization of Artificial Bee Colony algorithm in predicting learners' usage of an e-learning portal provides an indicator to the developers on the portals effectiveness.Such information is then useful in producing a marketable and valuable e-learning portal…”
Get full text
Get full text
Conference or Workshop Item -
16
A federated usage control framework with ontology-based policy and elimination of irrelevant rules set algorithm for grid computing authorization
Published 2019“…This thesis aims at providing solutions to the problem by introducing an authorization framework, namely the Federated Grid Usage Control (FGUC) with a new ontology-based policy model, namely, the UCON based Access Control Ontology (UBACO), and a new grid authorization algorithm, namely, the Elimination of the Irrelevant Authorization Rules Set (EIARS). …”
Get full text
Get full text
Thesis -
17
-
18
-
19
Taxonomy of memory usage in swarm intelligence-based metaheuristics
Published 2019“…This paper aims to review memory usage and its effect on the performance of the main SI-based metaheuristics. …”
Get full text
Get full text
Get full text
Article -
20
Multi-objective optimization of stand-alone hybrid renewable energy system by genetic algorithm
Published 2013“…Multi-objective optimization of HRES by Evolutionary Algorithm have become attractive in recent years due to the effectiveness of such algorithms for complicated problems. …”
Get full text
Get full text
Thesis
