Search Results - (( usage information system algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- information system »
- usage information »
- system algorithm »
- java application »
-
1
-
2
Dynamic modeling by usage data for personalization systems
Published 2009“…This paper proposes an off-line model based web usage mining that is generated by clustering algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
3
Developing Bus Tracking System that predicts the arrival times of public buses at Universiti Teknologi PETRONAS (UTP) bus stops.
Published 2004“…The combination usage of the algorithm, AVL, GPS and SMS server, the information regarding the time arrival of the transport can easily being retrieve by users. …”
Get full text
Get full text
Final Year Project -
4
A recommender system approach for classifying user navigation patterns using longest common subsequence algorithm.
Published 2009Subjects: Get full text
Get full text
Article -
5
-
6
Dynamic characterized genetic algorithm for adaptive beam forming in WCDMA system
Published 2005Get full text
Get full text
Get full text
Proceeding Paper -
7
E-Hadith DV: Hadith scriptures in Syafie Madhhab retrieval using data visualization / Nor Faezahtul Salme Norhisam
Published 2020“…Therefore, a progressive web-based information retrieval visualization system that utilizes Term Frequency-Inverse Document Frequency (TFIDF) algorithm and data visualization are suggested to solve these problems. …”
Get full text
Get full text
Thesis -
8
-
9
An Effective Fast Searching Algorithm for Internet Crawling Usage
Published 2016Get full text
Get full text
Get full text
Conference or Workshop Item -
10
-
11
Advanced current and power consumption monitoring with overload protection / Dinie Haqeemy Abdul Mu'izz
Published 2024“…This information enables customers to make more educated decisions about energy usage optimization and efficiency enhancement. …”
Get full text
Get full text
Student Project -
12
Workload utilization dissemination on grid resources for simulation environment
Published 2013“…In contemplating the exploration, this study successfully describe the pattern of workload dissemination through the usage of the RI's and elicited the enhancement factors for systems performance. …”
Get full text
Get full text
Conference or Workshop Item -
13
Relationship based replication algorithm for data grid
Published 2014“…The Relationship based Replication algorithm aims to improve the Data Grid performance by reducing the job execution time, bandwidth and storage usage.The RBR was realized using a network simulation (OptorSim) and experiment results revealed that it offers better performance than existing replication algorithms.…”
Get full text
Get full text
Monograph -
14
The tuning of error signal for back-propagation algorithms
Published 2008Get full text
Get full text
Get full text
Thesis -
15
The usage of watermarking to store patient information and diagnosis in medical images
Published 2011Get full text
Get full text
Undergraduates Project Papers -
16
Shuffling algorithms for automatic generator question paper system.
Published 2010Get full text
Get full text
Article -
17
Location based services of nearest petrol station using asymmetric key algorithm / Muhammad Awwab Mohd Amdan
Published 2014“…El-gamal encryption system is an asymmetric key encryption algorithm which is based on the Diffie-Hellman key exchange. …”
Get full text
Get full text
Thesis -
18
RSA algorithm performance in short messaging system exchange environment
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item -
19
BFEDroid: A Feature Selection Technique to Detect Malware in Android Apps Using Machine Learning
Published 2023“…Android (operating system); Android malware; Classification (of information); Feature Selection; Learning systems; Mobile security; Android apps; Classification models; Feature weight; Features selection; Machine learning algorithms; Machine-learning; Malware detection; Malwares; Memory usage; Selection techniques; Learning algorithms…”
Article -
20
Methods of intrusion detection in information security incident detection: a comparative study
Published 2018“…With the high demand from the corporate and enterprise, more and more security appliances were developed and deployed, such as IDS (Intrusion Detection Systems), IPS (Intrusion Prevention Systems), Firewall, and SIEM (Security Information and Event Management). …”
Get full text
Get full text
Get full text
Conference or Workshop Item
