Search Results - (( _ application ((a algorithm) OR (new algorithm)) ) OR ( web application svm algorithm ))*
Search alternatives:
- web application »
- application svm »
- new algorithm »
- svm algorithm »
- a algorithm »
-
1
Named entity recognition using a new fuzzy support vector machine.
Published 2008“…Some of the Machine learning algorithms used in NER methods are, support vector machine(SVM), Hidden Markov Model, Maximum Entropy Model (MEM) and Decision Tree. …”
Get full text
Get full text
Article -
2
A Proposed False Report Identification Algorithm for a Mobile Application in the IoT Environment
Published 2024Proceedings Paper -
3
A Knowledge Management System for Assessing Lecturer Competence in Indonesian Higher Educational Institutions
Published 2025“…Lecturer competency measurement is carried out by first checking employee status using the SVM algorithm with an accuracy value of 72.28%, then using a hybrid SVM and PSO algorithm with an accuracy value of 100%. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
An improved framework for content and link-based web spam detection: a combined approach
Published 2021“…The content-based web spam detection framework uses three proposed and two improved content-based algorithms for web spam detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
A WEB-BASED SYSTEM FOR THE PREDICTION OF STUDENT PERFORMANCE IN UPCOMING PUBLIC EXAMS BASED ON ACADEMIC RECORDS
Published 2023“…Teachers will be able to precisely forecast their students' impending grades utilizing the system's web-based application integration and machine learning algorithms. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
6
K-gen phishguard: an ensemble approach for phishing detection with k-means and genetic algorithm
Published 2025“…In the second phase, the best set of features in each group is identified through the Genetic algorithm to enhance the classification process. Finally, a voting ensemble technique is applied, in which the Support Vector Machine (SVM), Random Forest (RF), Extreme Gradient Boosting (XGBoost) and Adaptive boosting (AdaBoost) models are combined. …”
Get full text
Get full text
Get full text
Article -
7
A malicious URLs detection system using optimization and machine learning classifiers
Published 2020“…In this study, we applied features optimization approaches by using a bio-inspired algorithm for selecting significant URL features which able to detect malicious URLs applications. …”
Get full text
Get full text
Get full text
Article -
8
Classifying good and bad websites
Published 2015“…Websites classification has become a vital subject matter as most websites are increasingly being used as a platform for various applications. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
9
Malware visualizer: A web apps malware family classification with machine learning
Published 2021“…The web apps is developed using Python with help of Streamlit with is a Python library for building datadriven web apps. …”
Get full text
Get full text
Conference or Workshop Item -
10
Intent-IQ: customer’s reviews intent recognition using random forest algorithm
Published 2025“…Intent-IQ is a web application system which allows users to input Shopee product link and it leads to the intent classification, where the reviews can be classified into its intent categories such as praise, complaint and suggestion. …”
Get full text
Get full text
Get full text
Article -
11
Application of a New Efficient Normal Parameter Reduction Algorithm of Soft Sets in Online Shopping
Published 2014“…A new efficient normal parameter reduction algorithm of soft set in decision making was proposed. …”
Get full text
Get full text
Get full text
Article -
12
A new fair marker algorithm for DiffServ networks
Published 2008“…Internet Engineering Task Force (IETF) has proposed many new technologies to cover the new real time applications which have become very important in today's Internet demands. …”
Get full text
Get full text
Article -
13
A new algorithm for routing and scheduling in optical omega network
Published 2008“…We propose a new algorithm called the ZeroY algorithm (ZeroY) to avoid crosstalk and route the traffic in an OM IN more efficiently. …”
Get full text
Get full text
Get full text
Article -
14
Augmentation of basic-line-search and quick-simplex-method algorithms to enhance linear programming computational performance
Published 2021“…The LP’s application is need to be further computed with a technique and Simplex algorithm is the one that commonly used. …”
Get full text
Get full text
Get full text
Thesis -
15
OLBCA: a new lightweight block cipher algorithm
Published 2014Get full text
Get full text
Get full text
Proceeding Paper -
16
Monolingual and Cross-language Information Retrieval Approaches for Malay and English Language Document
Published 2006“…The results show that the new stemming algorithm and approaches are superior to the previous stemming algorithm and approach. …”
Get full text
Get full text
Thesis -
17
-
18
-
19
Improvement and performance analysis on statistical selection algorithms
Published 2006Get full text
Get full text
Conference or Workshop Item -
20
A new cryptographic algorithm based on decomposition problem in elliptic curve cryptography / Hilyati Hanina Zazali
Published 2012“…The third algorithm describes the application of Decomposition Problem to the signing and verifying digital messages in ECC. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis
