Search Results - (( _ ((application ria) OR (application a)) algorithm ) OR ( web application tree algorithm ))*

Refine Results
  1. 1
  2. 2

    An optimized attack tree model for security test case planning and generation by Omotunde, Habeeb, Ibrahim, Rosziati, Ahmed, Maryam

    Published 2018
    “…This paper presents an attack tree modeling algorithm for deriving a minimal set of effective attack vectors required to test a web application for SQL injection vulnerabilities. …”
    Get full text
    Get full text
    Article
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7

    Car dealership web application by Yap, Jheng Khin

    Published 2022
    “…In this project, a web application and a web service were proposed and implemented. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8

    Cyberbullying detection: a machine learning approach by Yeong, Su Yen

    Published 2022
    “…Machine learning is a hot topic and it is widely implemented in software, web application and more. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9

    An improved framework for content and link-based web spam detection: a combined approach by Shahzad, Asim

    Published 2021
    “…The content-based web spam detection framework uses three proposed and two improved content-based algorithms for web spam detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Content-based recommender system for an academic social network / Vala Ali Rohani by Vala Ali, Rohani

    Published 2014
    “…The algorithm exploits all interests and preferences in a hierarchy tree structure. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Defect green coffee bean detection using image recognition and supervised learning by Shafian Izan Sofian

    Published 2022
    “…Therefore, in this research project, the process will be conducted by using an image classifier with the model of a machine learning algorithm which the candidates comprise of Support Vector Machine, k-Nearest Neighbour and Decision Tree. k-nearest neighbour has the highest F1-score (0.51) than the other two algorithms (Support Vector Machine: 0.50, and Decision Tree: 0.48). …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  12. 12

    Comparative study of machine learning algorithms in data classification by Tan, Kai Jun

    Published 2025
    “…The results will help with real-world data mining applications of machine learning and be a useful guide for further study and practical applications.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13
  14. 14

    Context-Aware Recommender System based on machine learning in tourist mobile application / Nor Liza Saad … [et al.] by Saad, Nor Liza, Khairudin, Nurkhairizan, Azizan, Azilawati, Abd Rahman, Abdullah Sani, Ibrahim, Roslina

    Published 2022
    “…Based on usability study, most users agreed that the tourist mobile application is easier and useful for them. From the machine learning evaluation, Random Forest algorithm has generated the most accurate prediction compared to Decision Tree, Logistic Regression and Generalized Linear Model. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Named entity recognition using a new fuzzy support vector machine. by Mansouri, Alireza, Affendy, Lilly Suriani, Mamat, Ali

    Published 2008
    “…Some of the Machine learning algorithms used in NER methods are, support vector machine(SVM), Hidden Markov Model, Maximum Entropy Model (MEM) and Decision Tree. …”
    Get full text
    Get full text
    Article
  17. 17

    Adaptive approach in handling human inactivity in computer power management by Candrawati, Ria, Hashim, Nor Laily

    Published 2016
    “…Human inactivity is handled by adapting the behavioral changes of the users.Human inactivity refers to as unpredictable workload of a complex system that is caused by increments of amount in power consumption and it can be handled automatically without the need to set a fixed time for changing the computer state.This is happens due to lack of knowledge in a software system and the software self-adaptation is one approach in dealing with this source of uncertainty. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Optimized Decision Forest for Website Phishing Detection by Balogun, A.O., Mojeed, H.A., Adewole, K.S., Akintola, A.G., Salihu, S.A., Bajeh, A.O., Jimoh, R.G.

    Published 2021
    “…The development of web and internet technology has resulted in its application in a wide range of services. …”
    Get full text
    Get full text
    Article
  19. 19

    Machine Learning Applications in Multiplayer Online Battle Arena Esports—A Systematic Review by Ahmad Alif, Kamal, Mohd. Asyraf, Mansor, Liyana, Truna, Norhunaini, Mohd. Shaipullah, Nor Hafizie, Habib Sultan

    Published 2025
    “…Machine learning (ML) is an emerging field, while multiplayer online battle arena (MOBA) esports has seen a rise as a research subject of interest. The applications of ML in MOBA are an interesting field of study as the esports genre is enriched by a plethora of data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Application of artificial intelligence (AI) in islamic investments by Haneffa Muchlis Gazali, Junisa Jumadi, Noor Rasyidah Ramlan, Nurmaisarah Abd Rahmat, Siti Nor Hazilawati Mohd Uzair, Amirah Norliyana Mohid

    Published 2020
    “…The technology helps investors to analyse their stocks in terms of price levels, the current stability of each stock and the future price forecasts based on current price and stock data. The study is a conceptual discussion on the application of AI in Islamic investment, which focuses on the discussion of Text Mining, Algorithmic Trading, Stock Pick and Robo in Investment, which include Robo Advisor, Robo Islamic Advisor (RIA) and Robo Financial Advisor (RFA) operating in Islamic investment system. …”
    Get full text
    Get full text
    Get full text
    Article