Search Results - (( java segmentation using algorithm ) OR ( pattern application server algorithm ))
Search alternatives:
- pattern application »
- application server »
- java segmentation »
- server algorithm »
- using algorithm »
-
1
Image clustering comparison of two color segmentation techniques
Published 2010“…Finally, the algorithm found, which would solve the image segmentation problem.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Load balancing and server consolidation in cloud computing environments: a meta-study
Published 2019“…Therefore, this paper surveys published load balancing algorithms that achieved by server consolidation via a meta-analysis. …”
Get full text
Get full text
Get full text
Article -
3
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
4
Development of seven segment display recognition using TensorFlow on Raspberry Pi
Published 2022Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
5
Web usage mining for UUM learning care using association rules
Published 2004“…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
Get full text
Get full text
Thesis -
6
Web Usage Mining for UUM Learning Care Using Association Rules
Published 2004“…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
Get full text
Get full text
Get full text
Thesis -
7
Development of a Web Access Control Technique Based User Access Behavior
Published 2004“…A set of algorithms is used for mining user access behavior, preprocessing tasks for data preparation, association rules for defining the rules that describe the correlation between web user access transaction entries patterns, and sequential pattern discovery for finding the sequences of the web user access transaction entries pattern using Prefixspan (Pattern growth via frequent sequence lattice) algorithms. …”
Get full text
Get full text
Thesis -
8
-
9
A modified π rough k-means algorithm for web page recommendation system
Published 2018“…The experimental results revealed that the degree of user sessions outliers reduced than the previous method while in pattern discovery stage, the results of user sessions partition with the modified πRKM algorithm are measured by the Davies Bouldin Index (DBI). …”
Get full text
Get full text
Get full text
Thesis -
10
Using Markov Model and Association Rules for Web Access Prediction
Published 2006Get full text
Get full text
Conference or Workshop Item -
11
-
12
-
13
Design of monitoring and control system of electricity power limiter using internet of things
Published 2025“…This system uses the PZM-004T sensor to measure electricity consumption by measuring current and voltage and then sending the data via the WiFi network to a cloud server. Users can access information related to electricity usage via web-based or mobile applications that provide data display in the form of a reports. …”
Get full text
Get full text
Book Section -
14
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…In this modern era of enterprise computing, the enterprise application integration (EAI) is a well-known industry-recognized architectural principle that is built based on loosely coupled application architecture, where service-oriented architecture (SOA) is the architectural pattern for the implementation of EAI, whose computational elements are called as â��services.â�� Though SOA can be implemented in a wide range of technologies, the web services implementation of SOA becomes the current selective choice due to its simplicity that works on basic Internet protocols. …”
Get full text
Get full text
Article -
15
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…In this modern era of enterprise computing, the enterprise application integration (EAI) is a well-known industry-recognized architectural principle that is built based on loosely coupled application architecture, where service-oriented architecture (SOA) is the architectural pattern for the implementation of EAI, whose computational elements are called as â��services.â�� Though SOA can be implemented in a wide range of technologies, the web services implementation of SOA becomes the current selective choice due to its simplicity that works on basic Internet protocols. …”
Get full text
Get full text
Article -
16
Analysis and decentralised optimal flow control of heterogeneous computer communication network models
Published 1993“…A new method of general model reduction using the Norton' s theorem for general queueing networks in conjunction with the universal maximum entropy algorithm is proposed for the analysis of xix large general closed queueing networks. …”
Get full text
Get full text
Get full text
Thesis -
17
Class attendance management system using face recognition
Published 2018Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
-
19
A smart metering for energy management system via GSM-SMS based protocol
Published 2011Get full text
Get full text
Undergraduates Project Papers -
20
Q-Learning-based detection of IPv6 intrusions: a behavioral and performance study
Published 2025Get full text
Get full text
Get full text
Get full text
Proceeding Paper
