Search Results - (( process applications usage algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- process applications »
- applications usage »
- implication based »
- java implication »
- usage algorithm »
-
1
Web Usage Mining for UUM Learning Care Using Association Rules
Published 2004“…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
Get full text
Get full text
Get full text
Thesis -
2
Data pre-processing on web server logs for generalized association rules mining algorithm
Published 2008“…Since the pre-processing is tedious process, it depending on the algorithm and purposes of the applications.…”
Get full text
Get full text
Article -
3
A web usage mining approach based on LCS algorithm in online predicting recommendation systems
Published 2008“…Online prediction is one Web Usage Mining application. However, the accuracy of the prediction and classification in the current architecture of predicting users' future requests systems can not still satisfy users especially in huge Web sites. …”
Get full text
Get full text
Article -
4
Web usage mining for UUM learning care using association rules
Published 2004“…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
Get full text
Get full text
Thesis -
5
-
6
Resource Minimization in a Real-time Depth-map Processing System on FPGA
Published 2011Get full text
Get full text
Conference or Workshop Item -
7
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…There are four experiment conducted such as processing time, power usage, memory usage and data modification attack. …”
Get full text
Get full text
Thesis -
8
Development of decentralized data fusion algorithm with optimized kalman filter.
Published 2016“…The results in all the applications confirm that optimization has significantly reduced execution time and memory usage of selected data fusion algorithm. …”
Get full text
Get full text
Thesis -
9
A COLLABORATIVE FRAMEWORK FOR ANDROID MALWARE IDENTIFICATION USING DYNAMIC ANALYSIS
Published 2019“…The Correlationbased Feature Selection Evaluator (CfsSubset) algorithm is applied in feature selection process in order to improve the classification process. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
10
Web usage mining: A review of recent works
Published 2015“…Our objective is to provide an overview of web usage mining concepts relevant to pattern mining phase of web usage mining process. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
An improved chaotic image encryption algorithm
Published 2018Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
Panoramic image matching method for uav remote sensing based on surf algorithm
Published 2024text::Final Year Project -
13
PID Tuning Of Process Plant Using Evolutionary Algorithm
Published 2014“…The mature and stable performance of it had increased the usage of the PID controller in multiple fields such as process control, robotic and chemical plants. …”
Get full text
Get full text
Final Year Project -
14
An energy based cluster head selection unequal clustering algorithm with dual sink (ECH-DUAL) for continuous monitoring applications in wireless sensor networks
Published 2018“…Clustering of sensor nodes is a significant process that improves network lifetime and energy efficiency ofWSN. …”
Get full text
Get full text
Article -
15
-
16
E-Hadith DV: Hadith scriptures in Syafie Madhhab retrieval using data visualization / Nor Faezahtul Salme Norhisam
Published 2020“…First, the hadith data and the user query will go through the pre-processing method. Next, the TF-IDF algorithm is performed on the processed data to find the relevant hadith based on the user’s query. …”
Get full text
Get full text
Thesis -
17
A modified π rough k-means algorithm for web page recommendation system
Published 2018“…Web page recommendation system is an application of Web Usage Mining (WUM) approach, which specializes in predicting the user next browsing activity in real-time Web for personalized recommendations. …”
Get full text
Get full text
Get full text
Thesis -
18
Agro-ento bioinformation: towards the edge of reality
Published 2002“…The protocols range from the molecular levels to domains of larger dimensions such as those encompassing fraternities of politics and policies, and societal applications. These protocols, algorithms, and visualisations undergo dynamic incubation processes to produce the end product, which is bioinformation. …”
Get full text
Get full text
Inaugural Lecture -
19
-
20
Sentiment mining using immune network algorithm /Raja Muhammad Hafiz Raja Kamarudin
Published 2012“…The results obtained by utilizing Immune Network in sentiment mining are not very impressive compared to other Machine Learning algorithms. The algorithms can be improved furthermore by including other disciplines such as Natural Language Processing (NLP) or others. …”
Get full text
Get full text
Thesis
