-
1by Ainul Hazmin A.Hamid“.... The implementation of RFID in inventory management system is to assist the institution in keeping track of trees...”
Published 2009
Get full text
Thesis -
2by Anjomshoae, Sule“... tree. Currently, clone inspectors classify the rubber tree clones manually using leaf features...”
Published 2014
Get full text
Thesis -
3by Anjomshoae, Sule“... tree. Currently, clone inspectors classify the rubber tree clones manually using leaf features...”
Published 2014
Thesis -
4by M. Abunadi, Ahmed I.“... significant features for phishing websites are suggested. Meanwhile, Pruning Decision Tree is used...”
Published 2013
Get full text
Thesis -
5by Mohamed Arrish, Senosy Suliman“... agriculture, where the human can calculate the crown of the tree for very wide area in very short time...”
Published 2014
Get full text
Thesis -
6by Sadeghian, Amirmohammad“... for improving signature based IDSs performance. An improved model of SQL injection detection by using a tree...”
Published 2014
Thesis -
7by Behravesh, Babak“...). This system is designed and developed based on a novel binary tree-based directed graph (BTDG) as a unified...”
Published 2016
Get full text
Thesis -
8