Search Results - (( _ application ((a algorithm) OR (new algorithm)) ) OR ( web application svm algorithm ))*

Refine Results
  1. 1

    Named entity recognition using a new fuzzy support vector machine. by Mansouri, Alireza, Affendy, Lilly Suriani, Mamat, Ali

    Published 2008
    “…Some of the Machine learning algorithms used in NER methods are, support vector machine(SVM), Hidden Markov Model, Maximum Entropy Model (MEM) and Decision Tree. …”
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    A Knowledge Management System for Assessing Lecturer Competence in Indonesian Higher Educational Institutions by Syaripudin, Undang

    Published 2025
    “…Lecturer competency measurement is carried out by first checking employee status using the SVM algorithm with an accuracy value of 72.28%, then using a hybrid SVM and PSO algorithm with an accuracy value of 100%. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    An improved framework for content and link-based web spam detection: a combined approach by Shahzad, Asim

    Published 2021
    “…The content-based web spam detection framework uses three proposed and two improved content-based algorithms for web spam detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    A WEB-BASED SYSTEM FOR THE PREDICTION OF STUDENT PERFORMANCE IN UPCOMING PUBLIC EXAMS BASED ON ACADEMIC RECORDS by DELLON, NELSON BRUNNIE

    Published 2023
    “…Teachers will be able to precisely forecast their students' impending grades utilizing the system's web-based application integration and machine learning algorithms. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  6. 6

    K-gen phishguard: an ensemble approach for phishing detection with k-means and genetic algorithm by Al-Hafiz, Ali Raheem, Jabir, Adnan J., Subramaniam, Shamala

    Published 2025
    “…In the second phase, the best set of features in each group is identified through the Genetic algorithm to enhance the classification process. Finally, a voting ensemble technique is applied, in which the Support Vector Machine (SVM), Random Forest (RF), Extreme Gradient Boosting (XGBoost) and Adaptive boosting (AdaBoost) models are combined. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    A malicious URLs detection system using optimization and machine learning classifiers by Lee, Ong Vienna, Heryanto, Ahmad, Mohd Faizal, Ab Razak, Anis Farihan, Mat Raffei, Eh Phon, Danakorn Nincarean, Shahreen, Kasim, Sutikno, Tole

    Published 2020
    “…In this study, we applied features optimization approaches by using a bio-inspired algorithm for selecting significant URL features which able to detect malicious URLs applications. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Classifying good and bad websites by Koo, Ee Woon

    Published 2015
    “…Websites classification has become a vital subject matter as most websites are increasingly being used as a platform for various applications. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  9. 9

    Malware visualizer: A web apps malware family classification with machine learning by Mohd Zamri, Osman, Ahmad Firdaus, Zainal Abidin, Rahiwan Nazar, Romli

    Published 2021
    “…The web apps is developed using Python with help of Streamlit with is a Python library for building datadriven web apps. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Intent-IQ: customer’s reviews intent recognition using random forest algorithm by Mazlan, Nur Farahnisrin, Ibrahim Teo, Noor Hasimah

    Published 2025
    “…Intent-IQ is a web application system which allows users to input Shopee product link and it leads to the intent classification, where the reviews can be classified into its intent categories such as praise, complaint and suggestion. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Application of a New Efficient Normal Parameter Reduction Algorithm of Soft Sets in Online Shopping by Ma, Xiuqin, Hongwu, Qin

    Published 2014
    “…A new efficient normal parameter reduction algorithm of soft set in decision making was proposed. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    A new fair marker algorithm for DiffServ networks by Elshaikh, M.A., Mohamed, Othman, Subramaniam, Shamala, Md. Desa, Jalil

    Published 2008
    “…Internet Engineering Task Force (IETF) has proposed many new technologies to cover the new real time applications which have become very important in today's Internet demands. …”
    Get full text
    Get full text
    Article
  13. 13

    A new algorithm for routing and scheduling in optical omega network by Al-Shabi, Mohammed Abdulhameed Ali, Othman, Mohamed

    Published 2008
    “…We propose a new algorithm called the ZeroY algorithm (ZeroY) to avoid crosstalk and route the traffic in an OM IN more efficiently. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Augmentation of basic-line-search and quick-simplex-method algorithms to enhance linear programming computational performance by Nor Azlan, Nor Asmaa Alyaa

    Published 2021
    “…The LP’s application is need to be further computed with a technique and Simplex algorithm is the one that commonly used. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Monolingual and Cross-language Information Retrieval Approaches for Malay and English Language Document by Abdullah, Muhamad Taufik

    Published 2006
    “…The results show that the new stemming algorithm and approaches are superior to the previous stemming algorithm and approach. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19
  20. 20

    A new cryptographic algorithm based on decomposition problem in elliptic curve cryptography / Hilyati Hanina Zazali by Hilyati Hanina, Zazali

    Published 2012
    “…The third algorithm describes the application of Decomposition Problem to the signing and verifying digital messages in ECC. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis