Search Results - (( developing service pattern algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- developing service »
- pattern algorithm »
- implication based »
- java implication »
- service pattern »
-
1
BIOLOGICAL INSPIRED INTRUSION PREVENTION AND SELF-HEALING SYSTEM FOR CRITICAL SERVICES NETWORK
Published 2011“…This thesis presents new intrusion prevention and self-healing system (SH) for critical services network security. The design features of the proposed system are inspired by the human immune system, integrated with pattern recognition nonlinear classification algorithm and machine learning. …”
Get full text
Get full text
Thesis -
2
A recommender system approach for classifying user navigation patterns using longest common subsequence algorithm.
Published 2009“…In this paper, to provide online predicting effectively, we develop a model for online predicting through web usage mining system and propose a novel approach for classifying user navigation patterns to predict users’ future intentions. …”
Get full text
Get full text
Article -
3
Quality of service management algorithms in WiMAX networks
Published 2015“…Simulation have been extensively used to evaluate the proposed algorithm. Finally, Discrete Event Simulator (DES) is designed and developed in order to evaluate the performance of the proposed algorithms. …”
Get full text
Get full text
Thesis -
4
-
5
A Web-Based Recommendation System To Predict User Movements Through Web Usage Mining
Published 2009“…The approach in the offline phase is based on the new graph partitioning algorithm to model user navigation patterns for the navigation patterns mining. …”
Get full text
Get full text
Thesis -
6
Sales prediction of religious product and services of Mutawwif Haramain Travel & Tours using predictive analytics
Published 2025“…This research develops a predictive model for sales prediction at Mutawwif Haramain Travel & Tours, utilizing machine learning algorithms, specifically Decision Tree, Random Forest, and Naive Bayes, to uncover patterns in customer behavior and seasonal demand. …”
Get full text
Get full text
Student Project -
7
XML web services / Wong Kok Chuan
Published 2003“…Next is the implementation phase which covers a brief description on the development environment used, explanations on a few algorithms used and the coding techniques and patterns which I followed. …”
Get full text
Get full text
Thesis -
8
WebPUM : a web-based recommendation system to predict user future movements.
Published 2010“…The approach is based on the new graph partitioning algorithm to model user navigation patterns for the navigation patterns mining phase. …”
Get full text
Get full text
Get full text
Article -
9
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…This paper is written to present one of such algorithms to prevent SOA attacks on RESTful web services along the discussion on the obtained results of the conducted proof-of-concept on the real-time SOA environment. …”
Get full text
Get full text
Article -
10
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…This paper is written to present one of such algorithms to prevent SOA attacks on RESTful web services along the discussion on the obtained results of the conducted proof-of-concept on the real-time SOA environment. …”
Get full text
Get full text
Article -
11
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
12
Strategies for effective value management practice in construction industry
Published 2017“…The objectives were to develop a new optimisation algorithm and apply the results to control construction project costs. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
A study of customer retention and churn rate management through data mining and customer profiling of Malaysian mobile user
Published 2012Get full text
Get full text
Conference or Workshop Item -
14
Development of Artificial Neural Network (ANN) for lightning prediction under Malaysia environment / Jeremy AK Stewart Bedimbap
Published 2009“…In the proposed method, a three layer back-propagation neural network with Levenberg Marquardt algorithm has been developed and predicts the output data for the next four hours. …”
Get full text
Get full text
Thesis -
15
Sentiment analysis of customer review for Tina Arena Beauty
Published 2025“…An interactive dashboard was developed using Microsoft Power BI to visualize key sentiment trends by product and platform, providing Tina Arena Beauty with actionable insights to understand customer satisfaction, identify dissatisfaction patterns, and improve product and service offerings. …”
Get full text
Get full text
Student Project -
16
ios Mobile Malware Deep Analysis And Classification For Social Media And Online Banking Exploitation
Published 2024thesis::master thesis -
17
Efficient radio resource management algorithms for downlink long term evolution networks
Published 2018“…Hence, the major problem is developing a scheduling algorithm which creates a trade-off between the system performances. …”
Get full text
Get full text
Thesis -
18
Deep convolutional neural networks for forensic age estimation: A review
Published 2023“…This article will cover how modern technology has developed to provide new methods and algorithms to digitalise this process for the medical community and beyond. …”
Book Chapter -
19
Development of Artificial Neural Network for lightning prediction under Malaysia environment: article / Jeremy AK Stewart Bedimbap
Published 2009“…In the proposed method, a three layer back-propagation neural network with Levenberg Marquardt algorithm has been developed and predict the output data for four hours in advanced. …”
Get full text
Get full text
Article -
20
Bibliometric analysis of AI-driven FinTech revolution: mapping global trends, thematic evolution, and future directions
Published 2026“…However, despite such advances, issues related to algorithmic bias, transparency, and cybersecurity risks remain persistent. …”
Get full text
Get full text
Get full text
Article
